Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522724
MD5:5027e6b49ab2616a8f08f4c868b90dba
SHA1:f7bbc4c784fb2a30d8a018b65f2632507335590d
SHA256:509c5bf724b0d3bc60cdc93c1b0f1e6710cf23edb2293d670cb8bdeaa5ac7e6f
Tags:exeGandCrabuser-jstrosch
Infos:

Detection

Gandcrab, ReflectiveLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gandcrab
Yara detected ReflectiveLoader
AI detected suspicious sample
Contains functionality to determine the online IP of the system
Found Tor onion address
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses nslookup.exe to query domains
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found potential string decryption / allocating functions
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 3408 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 5027E6B49AB2616A8F08F4C868B90DBA)
    • dllhost.exe (PID: 3592 cmdline: C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
    • nslookup.exe (PID: 5728 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 3520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 5988 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 2812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 6952 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 3960 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 2272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 1636 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 3080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 6880 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dwqocx.exe (PID: 2524 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe" MD5: 792DCCE2F5F5C326C8A2A36E993BB215)
    • nslookup.exe (PID: 4152 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 3640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 7068 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 6164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2456 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 1708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 5848 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 5864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 5960 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 4128 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 6136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 6480 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 4716 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 1260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 700 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 4028 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 5220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2524 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 924 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 7000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 4676 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2228 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 5544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2780 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2624 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 5732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2668 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 1104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 5176 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 2012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 6052 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MpCmdRun.exe (PID: 6304 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 7100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 1708 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 4844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 6084 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 1260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2256 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 3280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 2536 cmdline: nslookup zonealarm.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 2700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 6372 cmdline: nslookup ransomware.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 7032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 3520 cmdline: nslookup zonealarm.bit ns2.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 2012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nslookup.exe (PID: 3640 cmdline: nslookup ransomware.bit ns1.cloud-name.ru MD5: 9D2EB13476B126CB61B12CDD03C7DCA6)
      • conhost.exe (PID: 2636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • dwqocx.exe (PID: 3536 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe" MD5: 792DCCE2F5F5C326C8A2A36E993BB215)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
GandcrabGandCrab was a Ransomware-as-a-Service (RaaS) emerged in January 28, 2018, managed by a criminal organization known to be confident and vocal, while running a rapidly evolving ransomware campaign. Through their aggressive, albeit unusual, marketing strategies and constant recruitment of affiliates, they were able to globally distribute a high volume of their malware.In a surprising announcement on May 31, 2019, the GandCrabs operators posted on a dark web forum, announced the end of a little more than a year of ransomware operations, citing staggering profit figures. However, If theres one thing that sets these threat actors apart from other groups, it is that they are unpredictable; so there is always the possibility that they might re-surface in one form or another.
  • Pinchy Spider
https://malpedia.caad.fkie.fraunhofer.de/details/win.gandcrab
No configs have been found
SourceRuleDescriptionAuthorStrings
0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
    00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
      00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
        00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpGandcrabGandcrab Payloadkevoreilly
        • 0xfbd8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
        00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
        • 0x10681:$s1: _ReflectiveLoader@
        • 0x10682:$s2: ReflectiveLoader@
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        29.2.dwqocx.exe.fe20c0.2.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
          29.2.dwqocx.exe.fe20c0.2.unpackGandcrabGandcrab Payloadkevoreilly
          • 0xd7d8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
          29.2.dwqocx.exe.fe20c0.2.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
          • 0xe281:$s1: _ReflectiveLoader@
          • 0xe282:$s2: ReflectiveLoader@
          29.2.dwqocx.exe.430000.0.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
            29.2.dwqocx.exe.430000.0.unpackGandcrabGandcrab Payloadkevoreilly
            • 0xe9d8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
            Click to see the 40 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\file.exe, ProcessId: 3408, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bgummckzlfn
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-30T16:03:49.107021+020020254521A Network Trojan was detected192.168.2.11508211.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-30T16:03:50.683722+020020254531A Network Trojan was detected192.168.2.11508261.1.1.153UDP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: file.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: file.exeReversingLabs: Detection: 92%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeJoe Sandbox ML: detected
            Source: file.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB8880 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,0_2_00BB8880
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB64F0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,0_2_00BB64F0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB58D0 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrlenW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,0_2_00BB58D0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB4B30 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,0_2_00BB4B30
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB8730 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,0_2_00BB8730
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB56A0 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,0_2_00BB56A0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB34F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,0_2_00BB34F0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB5400 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,0_2_00BB5400
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6770 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,LeaveCriticalSection,LeaveCriticalSection,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,0_2_00BB6770
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F94B30 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,15_2_00F94B30
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F964F0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,15_2_00F964F0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F934F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,15_2_00F934F0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F958D0 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrlenW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,15_2_00F958D0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F956A0 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,15_2_00F956A0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F98880 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,15_2_00F98880
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F96770 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,LeaveCriticalSection,LeaveCriticalSection,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,15_2_00F96770
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F98730 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,15_2_00F98730
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F95400 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,15_2_00F95400
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00434B30 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,29_2_00434B30
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00436770 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,LeaveCriticalSection,LeaveCriticalSection,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,29_2_00436770
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00435400 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,29_2_00435400
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00438730 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,29_2_00438730
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_004358D0 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrlenW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,lstrlenW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,29_2_004358D0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_004364F0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,29_2_004364F0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_004334F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,29_2_004334F0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00438880 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,29_2_00438880
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_004356A0 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,29_2_004356A0

            Compliance

            barindex
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeUnpacked PE file: 29.2.dwqocx.exe.430000.0.unpack
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\file.exeFile opened: z:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: x:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: v:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: t:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: r:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: p:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: n:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: l:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: j:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: h:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: f:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: b:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: y:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: w:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: u:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: s:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: q:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: o:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: m:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: k:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: i:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: g:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: e:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: a:Jump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6CB0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,0_2_00BB6CB0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6F00 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,0_2_00BB6F00
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F96CB0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,15_2_00F96CB0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F96F00 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,15_2_00F96F00
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00436F00 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,29_2_00436F00
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00436CB0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,29_2_00436CB0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2025452 - Severity 1 - ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup) : 192.168.2.11:50821 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2025453 - Severity 1 - ET MALWARE Observed GandCrab Ransomware Domain (zonealarm .bit in DNS Lookup) : 192.168.2.11:50826 -> 1.1.1.1:53
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB7160 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com0_2_00BB7160
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB7160 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com0_2_00BB7160
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F97160 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com15_2_00F97160
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F97160 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com15_2_00F97160
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00437160 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com29_2_00437160
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00437160 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com29_2_00437160
            Source: file.exeString found in binary or memory: rab2pie73et.onion.guide/da3fe3083522c987 1. https://gandcrab2pie73et.onion.rip/da3fe3083522c987
            Source: file.exeString found in binary or memory: 2. https://gandcrab2pie73et.onion.plus/da3fe3083522c987 3. https://gandcrab2pie73et.onion.
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 3. Open link in TOR browser: http://gandcrab2pie73et.onion/da3fe3083522c987
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 0. https://gandcrab2pie73et.onion.guide/da3fe3083522c987
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 1. https://gandcrab2pie73et.onion.rip/da3fe3083522c987
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 2. https://gandcrab2pie73et.onion.plus/da3fe3083522c987
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 3. https://gandcrab2pie73et.onion.to/da3fe3083522c987
            Source: file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 3. Open link in TOR browser: http://gandcrab2pie73et.onion/da3fe3083522c987
            Source: file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 0. https://gandcrab2pie73et.onion.guide/da3fe3083522c987
            Source: file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 1. https://gandcrab2pie73et.onion.rip/da3fe3083522c987
            Source: file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 2. https://gandcrab2pie73et.onion.plus/da3fe3083522c987
            Source: file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: 3. https://gandcrab2pie73et.onion.to/da3fe3083522c987
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: global trafficTCP traffic: 192.168.2.11:49716 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.11:49715 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.11:49722 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.11:49721 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.11:49720 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.11:49719 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.11:49718 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.11:49717 -> 1.1.1.1:53
            Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
            Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
            Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB84D0 lstrcatW,InternetCloseHandle,InternetConnectW,VirtualAlloc,wsprintfW,HttpOpenRequestW,HttpAddRequestHeadersW,HttpSendRequestW,InternetReadFile,InternetReadFile,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,VirtualFree,0_2_00BB84D0
            Source: global trafficDNS traffic detected: DNS query: ipv4bot.whatismyipaddress.com
            Source: global trafficDNS traffic detected: DNS query: ns1.cloud-name.ru
            Source: global trafficDNS traffic detected: DNS query: 1.1.1.1.in-addr.arpa
            Source: global trafficDNS traffic detected: DNS query: zonealarm.bit
            Source: global trafficDNS traffic detected: DNS query: ns2.cloud-name.ru
            Source: global trafficDNS traffic detected: DNS query: ransomware.bit
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://gandcrab2pie73et.onion/da3fe3083522c987
            Source: file.exe, 00000000.00000002.2791556153.0000000000FAE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791556153.0000000000FFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/
            Source: file.exe, 00000000.00000002.2791556153.0000000000FAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/(
            Source: file.exe, 00000000.00000002.2791556153.0000000000FFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/;
            Source: file.exe, 00000000.00000002.2791556153.0000000000FFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/G
            Source: file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://sj.ms/register.php
            Source: file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.sfu.ca/jabber/Psi_Jabber_PC.pdf
            Source: file.exeString found in binary or memory: https://gandcrab2pie73et.onion.
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://gandcrab2pie73et.onion.guide/da3fe3083522c987
            Source: file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://gandcrab2pie73et.onion.plus/da3fe3083522c987
            Source: file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://gandcrab2pie73et.onion.rip/da3fe3083522c987
            Source: file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://gandcrab2pie73et.onion.to/da3fe3083522c987
            Source: file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://psi-im.org/download/
            Source: file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.torproject.org/

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 3408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dwqocx.exe PID: 2524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dwqocx.exe PID: 3536, type: MEMORYSTR
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6770 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,LeaveCriticalSection,LeaveCriticalSection,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,0_2_00BB6770
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F96770 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,LeaveCriticalSection,LeaveCriticalSection,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,15_2_00F96770
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00436770 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,LeaveCriticalSection,LeaveCriticalSection,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,29_2_00436770
            Source: conhost.exeProcess created: 48
            Source: nslookup.exeProcess created: 60

            System Summary

            barindex
            Source: 29.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 29.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 29.2.dwqocx.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 29.2.dwqocx.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 29.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 29.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 15.2.dwqocx.exe.f90000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 15.2.dwqocx.exe.f90000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.file.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 0.2.file.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 29.2.dwqocx.exe.430000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 29.2.dwqocx.exe.430000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 15.2.dwqocx.exe.f90000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 15.2.dwqocx.exe.f90000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 15.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 15.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.file.exe.e120c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 0.2.file.exe.e120c0.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 15.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 15.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.file.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 0.2.file.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.file.exe.e120c0.2.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 0.2.file.exe.e120c0.2.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 29.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 29.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 15.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 15.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.file.exe.e00000.1.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 0.2.file.exe.e00000.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
            Source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB89A00_2_00BB89A0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB1C200_2_00BB1C20
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB10200_2_00BB1020
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E124E00_2_00E124E0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E130E00_2_00E130E0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E084240_2_00E08424
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0A5FD0_2_00E0A5FD
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E079400_2_00E07940
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E07EB20_2_00E07EB2
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E096910_2_00E09691
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E19E600_2_00E19E60
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E01BFB0_2_00E01BFB
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0679C0_2_00E0679C
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F989A015_2_00F989A0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F91C2015_2_00F91C20
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F9102015_2_00F91020
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FE24E015_2_00FE24E0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FE30E015_2_00FE30E0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD842415_2_00FD8424
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FDA5FD15_2_00FDA5FD
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD794015_2_00FD7940
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD7EB215_2_00FD7EB2
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD969115_2_00FD9691
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FE9E6015_2_00FE9E60
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD1BFB15_2_00FD1BFB
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD679C15_2_00FD679C
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00431C2029_2_00431C20
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_0043102029_2_00431020
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_004389A029_2_004389A0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FE24E029_2_00FE24E0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FE30E029_2_00FE30E0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD842429_2_00FD8424
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FDA5FD29_2_00FDA5FD
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD794029_2_00FD7940
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD7EB229_2_00FD7EB2
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD969129_2_00FD9691
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FE9E6029_2_00FE9E60
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD1BFB29_2_00FD1BFB
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD679C29_2_00FD679C
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: String function: 00FD2790 appears 42 times
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: String function: 00FD32DA appears 32 times
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 29.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 29.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 29.2.dwqocx.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 29.2.dwqocx.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 29.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 29.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 15.2.dwqocx.exe.f90000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 15.2.dwqocx.exe.f90000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.file.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 0.2.file.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 29.2.dwqocx.exe.430000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 29.2.dwqocx.exe.430000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 15.2.dwqocx.exe.f90000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 15.2.dwqocx.exe.f90000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 15.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 15.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.file.exe.e120c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 0.2.file.exe.e120c0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 15.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 15.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.file.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 0.2.file.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.file.exe.e120c0.2.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 0.2.file.exe.e120c0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 29.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 29.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 15.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 15.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.file.exe.e00000.1.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 0.2.file.exe.e00000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
            Source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@398/2@1702/0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB7600 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,0_2_00BB7600
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB7CE0 wsprintfW,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,CreateToolhelp32Snapshot,VirtualFree,Process32FirstW,lstrcmpiW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,Process32NextW,GetLastError,lstrlenW,VirtualFree,VirtualFree,CloseHandle,VirtualFree,0_2_00BB7CE0
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5732:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3080:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7000:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2812:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4008:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6164:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4084:120:WilError_03
            Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=da3fe3083522c987
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6168:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2700:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:416:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4536:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5864:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7032:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4372:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3280:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1260:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5220:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3520:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1708:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2636:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5544:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2012:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3640:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1104:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2272:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6136:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7100:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4844:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4612:120:WilError_03
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeFile created: C:\Windows\SERVIC~1\LOCALS~1\AppData\Local\Temp\MpCmdRun.log
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: file.exeReversingLabs: Detection: 92%
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ru
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ru
            Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe" Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\dllhost.exeSection loaded: thumbcache.dllJump to behavior
            Source: C:\Windows\System32\dllhost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dll
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: mswsock.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: napinsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: pnrpnsp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: wshbth.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: nlaapi.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winrnr.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\nslookup.exeSection loaded: winnsi.dll
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeUnpacked PE file: 29.2.dwqocx.exe.430000.0.unpack
            Source: Yara matchFile source: 29.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 29.2.dwqocx.exe.430000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 29.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dwqocx.exe.f90000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.bb0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 29.2.dwqocx.exe.430000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dwqocx.exe.f90000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dwqocx.exe.fe20c0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.e120c0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dwqocx.exe.fe20c0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.bb0000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.e120c0.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 29.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 15.2.dwqocx.exe.fd0000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.file.exe.e00000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1583581493.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 3408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dwqocx.exe PID: 2524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dwqocx.exe PID: 3536, type: MEMORYSTR
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB8880 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,0_2_00BB8880
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E11069 push esp; iretd 0_2_00E11191
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E111A4 push 6C00E0CFh; iretd 0_2_00E111A9
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1119C pushad ; iretd 0_2_00E1119D
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E027D5 push ecx; ret 0_2_00E027E8
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FE1069 push esp; iretd 15_2_00FE1191
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD27D5 push ecx; ret 15_2_00FD27E8
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FE1069 push esp; iretd 29_2_00FE1191
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD27D5 push ecx; ret 29_2_00FD27E8
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeJump to dropped file
            Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bgummckzlfnJump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bgummckzlfnJump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bgummckzlfnJump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bgummckzlfnJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E01BFB EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00E01BFB
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_15-10760
            Source: C:\Users\user\Desktop\file.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-10777
            Source: C:\Users\user\Desktop\file.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,0_2_00BB2F50
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: EnumDeviceDrivers,EnumDeviceDrivers,VirtualAlloc,EnumDeviceDrivers,GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,15_2_00F92F50
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: EnumDeviceDrivers,EnumDeviceDrivers,VirtualAlloc,EnumDeviceDrivers,GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,29_2_00432F50
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeEvaded block: after key decisiongraph_15-11024
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeEvaded block: after key decisiongraph_29-11028
            Source: C:\Users\user\Desktop\file.exe TID: 4616Thread sleep count: 329 > 30Jump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 4616Thread sleep time: -329000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6CB0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,0_2_00BB6CB0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6F00 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,0_2_00BB6F00
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F96CB0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,15_2_00F96CB0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F96F00 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,15_2_00F96F00
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00436F00 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,29_2_00436F00
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00436CB0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,29_2_00436CB0
            Source: nslookup.exe, 00000043.00000002.1995462764.0000000002968000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6
            Source: nslookup.exe, 00000009.00000002.1628596929.0000000002B19000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 0000000D.00000002.1657036223.0000000002E09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
            Source: nslookup.exe, 0000002C.00000002.1860308992.0000000002677000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllm
            Source: nslookup.exe, 00000007.00000002.1616929297.0000000002B79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllT
            Source: nslookup.exe, 0000003C.00000002.1957470394.0000000002EE9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\\p
            Source: nslookup.exe, 0000003E.00000002.1970270373.00000000032F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^^4I
            Source: file.exe, 00000000.00000002.2791556153.0000000000FE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll_
            Source: nslookup.exe, 00000003.00000002.1589200684.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000005.00000002.1601748756.00000000035A9000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 0000000B.00000002.1644784030.0000000002C89000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000010.00000002.1678588129.0000000002C19000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 0000001B.00000002.1742251945.0000000002FB9000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000020.00000002.1780589150.0000000002E49000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000022.00000002.1793471404.0000000003348000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000024.00000002.1807509867.00000000031D9000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000026.00000002.1820162340.0000000002A79000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000028.00000002.1833392605.0000000002DA9000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 0000002A.00000002.1845682656.0000000002F79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: nslookup.exe, 00000012.00000002.1690269558.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000017.00000002.1716417022.0000000003319000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 0000001E.00000002.1764334421.0000000002AE9000.00000004.00000020.00020000.00000000.sdmp, nslookup.exe, 00000034.00000002.1913990128.0000000002D89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllZZ
            Source: nslookup.exe, 00000015.00000002.1703679027.0000000002918000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@@
            Source: nslookup.exe, 00000019.00000002.1728893613.0000000003409000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]]
            Source: nslookup.exe, 00000032.00000002.1900139978.0000000000469000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^^
            Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-10946
            Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-10725
            Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-10740
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeAPI call chain: ExitProcess graph end nodegraph_15-10932
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeAPI call chain: ExitProcess graph end nodegraph_15-9859
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeAPI call chain: ExitProcess graph end nodegraph_29-10934
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeAPI call chain: ExitProcess graph end nodegraph_29-9863
            Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E02984 IsDebuggerPresent,0_2_00E02984
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E04BCA EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00E04BCA
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB8880 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,0_2_00BB8880
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB6100 mov eax, dword ptr fs:[00000030h]0_2_00BB6100
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E175C0 mov eax, dword ptr fs:[00000030h]0_2_00E175C0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00F96100 mov eax, dword ptr fs:[00000030h]15_2_00F96100
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FE75C0 mov eax, dword ptr fs:[00000030h]15_2_00FE75C0
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00436100 mov eax, dword ptr fs:[00000030h]29_2_00436100
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FE75C0 mov eax, dword ptr fs:[00000030h]29_2_00FE75C0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB33E0 lstrlenA,GetProcessHeap,HeapAlloc,lstrcpyA,ExitProcess,0_2_00BB33E0
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0315A SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E0315A
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E03129 SetUnhandledExceptionFilter,0_2_00E03129
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD315A SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00FD315A
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 15_2_00FD3129 SetUnhandledExceptionFilter,15_2_00FD3129
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD315A SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_00FD315A
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeCode function: 29_2_00FD3129 SetUnhandledExceptionFilter,29_2_00FD3129
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe" Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup zonealarm.bit ns1.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup ransomware.bit ns2.cloud-name.ruJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB3C80 AllocateAndInitializeSid,GetModuleHandleA,GetProcAddress,FreeSid,0_2_00BB3C80
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB9680 cpuid 0_2_00BB9680
            Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E02620 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00E02620
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB7600 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,0_2_00BB7600
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: dwqocx.exeBinary or memory string: cmdagent.exe
            Source: dwqocx.exeBinary or memory string: cfp.exe
            Source: dwqocx.exeBinary or memory string: avengine.exe
            Source: dwqocx.exeBinary or memory string: msmpeng.exe
            Source: dwqocx.exeBinary or memory string: AVP.EXE
            Source: dwqocx.exeBinary or memory string: ashDisp.exe
            Source: dwqocx.exeBinary or memory string: avgnt.exe
            Source: dwqocx.exeBinary or memory string: Mcshield.exe
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
            Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Replication Through Removable Media
            1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts12
            Native API
            1
            Registry Run Keys / Startup Folder
            11
            Process Injection
            2
            Obfuscated Files or Information
            LSASS Memory11
            Peripheral Device Discovery
            Remote Desktop ProtocolData from Removable Media2
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Registry Run Keys / Startup Folder
            1
            Software Packing
            Security Account Manager1
            Account Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS1
            System Network Connections Discovery
            Distributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets1
            File and Directory Discovery
            SSHKeylogging1
            Proxy
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Virtualization/Sandbox Evasion
            Cached Domain Credentials45
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Process Injection
            DCSync51
            Security Software Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            Virtualization/Sandbox Evasion
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            Process Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture11
            System Network Configuration Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1522724 Sample: file.exe Startdate: 30/09/2024 Architecture: WINDOWS Score: 100 52 zonealarm.bit 2->52 54 ransomware.bit 2->54 56 4 other IPs or domains 2->56 58 Suricata IDS alerts for network traffic 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Antivirus / Scanner detection for submitted sample 2->62 64 6 other signatures 2->64 8 file.exe 1 11 2->8         started        12 dwqocx.exe 2->12         started        signatures3 process4 file5 36 C:\Users\user\AppData\Roaming\...\dwqocx.exe, PE32 8->36 dropped 66 Found evasive API chain (may stop execution after checking mutex) 8->66 68 Contains functionality to determine the online IP of the system 8->68 70 Found Tor onion address 8->70 72 Uses nslookup.exe to query domains 8->72 14 dwqocx.exe 8->14         started        17 nslookup.exe 1 8->17         started        20 nslookup.exe 1 8->20         started        22 32 other processes 8->22 signatures6 process7 dnsIp8 74 Antivirus detection for dropped file 14->74 76 Detected unpacking (creates a PE file in dynamic memory) 14->76 78 Found evasive API chain (may stop execution after checking mutex) 14->78 80 2 other signatures 14->80 38 zonealarm.bit 17->38 40 1.1.1.1.in-addr.arpa 17->40 24 conhost.exe 17->24         started        42 zonealarm.bit 20->42 48 2 other IPs or domains 20->48 26 conhost.exe 20->26         started        44 zonealarm.bit 22->44 46 zonealarm.bit 22->46 50 62 other IPs or domains 22->50 28 conhost.exe 22->28         started        30 conhost.exe 22->30         started        32 conhost.exe 22->32         started        34 28 other processes 22->34 signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            file.exe92%ReversingLabsWin32.Ransomware.GandCrab
            file.exe100%AviraTR/Dropper.Gen
            file.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            ipv4bot.whatismyipaddress.com
            unknown
            unknowntrue
              unknown
              ransomware.bit
              unknown
              unknowntrue
                unknown
                1.1.1.1.in-addr.arpa
                unknown
                unknownfalse
                  unknown
                  zonealarm.bit
                  unknown
                  unknowntrue
                    unknown
                    ns1.cloud-name.ru
                    unknown
                    unknowntrue
                      unknown
                      ns2.cloud-name.ru
                      unknown
                      unknowntrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://gandcrab2pie73et.onion.rip/da3fe3083522c987file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmptrue
                          unknown
                          https://psi-im.org/download/file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpfalse
                            unknown
                            http://gandcrab2pie73et.onion/da3fe3083522c987file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmptrue
                              unknown
                              http://ipv4bot.whatismyipaddress.com/(file.exe, 00000000.00000002.2791556153.0000000000FAE000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://ipv4bot.whatismyipaddress.com/Gfile.exe, 00000000.00000002.2791556153.0000000000FFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://gandcrab2pie73et.onion.file.exetrue
                                    unknown
                                    https://gandcrab2pie73et.onion.to/da3fe3083522c987file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmptrue
                                      unknown
                                      http://www.sfu.ca/jabber/Psi_Jabber_PC.pdffile.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpfalse
                                        unknown
                                        https://gandcrab2pie73et.onion.guide/da3fe3083522c987file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmptrue
                                          unknown
                                          https://www.torproject.org/file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpfalse
                                            unknown
                                            http://ipv4bot.whatismyipaddress.com/file.exe, 00000000.00000002.2791556153.0000000000FAE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791556153.0000000000FFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://sj.ms/register.phpfile.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmpfalse
                                                unknown
                                                http://ipv4bot.whatismyipaddress.com/;file.exe, 00000000.00000002.2791556153.0000000000FFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://gandcrab2pie73et.onion.plus/da3fe3083522c987file.exe, file.exe, 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmptrue
                                                    unknown
                                                    No contacted IP infos
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1522724
                                                    Start date and time:2024-09-30 16:02:23 +02:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 6m 46s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:73
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:file.exe
                                                    Detection:MAL
                                                    Classification:mal100.rans.troj.evad.winEXE@398/2@1702/0
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 98%
                                                    • Number of executed functions: 63
                                                    • Number of non-executed functions: 157
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, svchost.exe
                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                                    • VT rate limit hit for: file.exe
                                                    TimeTypeDescription
                                                    10:03:42API Interceptor1x Sleep call for process: dllhost.exe modified
                                                    10:04:22API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                    10:04:31API Interceptor298x Sleep call for process: file.exe modified
                                                    16:03:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce bgummckzlfn "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
                                                    16:03:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce bgummckzlfn "C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
                                                    No context
                                                    No context
                                                    No context
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\file.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):749568
                                                    Entropy (8bit):3.9341253465399197
                                                    Encrypted:false
                                                    SSDEEP:6144:WBb/GhISjsUpwWx7ko0dvmfMaZaocS427zkXQj3805rSj15jBvp9HxawFH4yeK1a:WBLGO0oWp6ZmEOazhsyQt5r
                                                    MD5:792DCCE2F5F5C326C8A2A36E993BB215
                                                    SHA1:376EA88188D9D611B5985C9F8F7A96FCF79E6FF3
                                                    SHA-256:BB3662E2CF1E6B1925C65B1304E824E04FF3C337CEA73E671AD76B8A9C79FDA0
                                                    SHA-512:54CD582DE482BEDE5A0C7D9F230E09A799D20C1523F11EF5A597B206546E0A29C30EA6E0C8CA901C456D20FF48EBF756BE9A4E303F8031D8C6DAAB61D3031793
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview:MZ......................@...............................................!..L.!This .b\.P.m cannot be run in DOS mode....$.......*p^.n.0.n.0.n.0.(@.w.0.(@.|.0.(@...0.gi..k.0.n.1.6.0.cC.l.0.cC.o.0.Richn.0.................PE..L....^.Z..........................................@.......................................@.................................$...(............................p..........................................@............................................text............................... ..`.rdata...E.......P..................@..@.data...$S.......`..................@....reloc.......p.......p..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):2464
                                                    Entropy (8bit):3.2417968494615015
                                                    Encrypted:false
                                                    SSDEEP:24:QOaqdmuF3r8wl+kWReHgHttUKlDENh+pyMySn6tUKlDENh+pyMySwwIPVxcwIPVs:FaqdF78wl+AAHdKoqKFxcxkFyw/
                                                    MD5:5C326700C8688F1A46A3FD1C88188DDB
                                                    SHA1:C9CBFE61821A3D32A31A7044DBBD17E815A23F02
                                                    SHA-256:AA4BF9370306578C43EEAC963241942B8821589FE6F1502D8FFA53F1669ACC2F
                                                    SHA-512:01F2A813152C2D14C0F513BED48721F12D63F7DDBAD851277C0C3D84672143A761F1B63CFA9034DFD6C556625E102017B416C5526D5B8E135502FBB990AF9A04
                                                    Malicious:false
                                                    Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. M.o.n. .. S.e.p. .. 3.0. .. 2.0.2.4. .1.0.:.0.4.:.2.2.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):3.934123532199371
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:file.exe
                                                    File size:749'568 bytes
                                                    MD5:5027e6b49ab2616a8f08f4c868b90dba
                                                    SHA1:f7bbc4c784fb2a30d8a018b65f2632507335590d
                                                    SHA256:509c5bf724b0d3bc60cdc93c1b0f1e6710cf23edb2293d670cb8bdeaa5ac7e6f
                                                    SHA512:35430b07d0ccc4e587a1cc416872a47ccfc90dd0f0fdf504f37d21725390c97c547ef73495adc1d79175cd3d3341e8ba9ff6ba7d9ee515b62d51ac3c00859956
                                                    SSDEEP:6144:dBb/GhISjsUpwWx7ko0dvmfMaZaocS427zkXQj3805rSj15jBvp9HxawFH4yeK1a:dBLGO0oWp6ZmEOazhsyQt5r
                                                    TLSH:84F4AD0222D04E75DEE3B4799575F6700FB9391C2BB03E0BA6D291EB367DE604A31687
                                                    File Content Preview:MZ......................@...............................................!..L.!This hn{6..m cannot be run in DOS mode....$.......*p^.n.0.n.0.n.0.(@..w.0.(@..|.0.(@....0.gi..k.0.n.1.6.0.cC..l.0.cC..o.0.Richn.0.................PE..L....^.Z...................
                                                    Icon Hash:90cececece8e8eb0
                                                    Entrypoint:0x4013b6
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x5AC65ECC [Thu Apr 5 17:37:16 2018 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:7b6dd4245c054681d7b6b1f9b76fe984
                                                    Instruction
                                                    call 00007FF53D07C34Ah
                                                    jmp 00007FF53D07AF60h
                                                    cmp ecx, dword ptr [00411050h]
                                                    jne 00007FF53D07B0E4h
                                                    rep ret
                                                    jmp 00007FF53D07C6D7h
                                                    int3
                                                    mov ecx, dword ptr [esp+08h]
                                                    mov eax, dword ptr [esp+04h]
                                                    push edi
                                                    push ebx
                                                    push esi
                                                    cmp dword ptr [00425060h], 01h
                                                    jc 00007FF53D07B2B4h
                                                    ja 00007FF53D07B1E3h
                                                    movzx edx, byte ptr [ecx]
                                                    mov ebx, edx
                                                    shl edx, 08h
                                                    or edx, ebx
                                                    je 00007FF53D07B1CFh
                                                    movd xmm3, edx
                                                    pshuflw xmm3, xmm3, 00h
                                                    movlhps xmm3, xmm3
                                                    pxor xmm0, xmm0
                                                    mov esi, ecx
                                                    or edi, FFFFFFFFh
                                                    movzx ebx, byte ptr [ecx]
                                                    add ecx, 01h
                                                    test ebx, ebx
                                                    je 00007FF53D07B0FFh
                                                    test ecx, 0000000Fh
                                                    jne 00007FF53D07B0D0h
                                                    movdqa xmm2, dqword ptr [ecx]
                                                    pcmpeqb xmm2, xmm0
                                                    pmovmskb ebx, xmm2
                                                    test ebx, ebx
                                                    jne 00007FF53D07B0E7h
                                                    mov edi, 0000000Fh
                                                    movd edx, xmm3
                                                    mov ebx, 00000FFFh
                                                    and ebx, eax
                                                    cmp ebx, 00000FF0h
                                                    jnbe 00007FF53D07B109h
                                                    movdqu xmm1, dqword ptr [eax]
                                                    pxor xmm2, xmm2
                                                    pcmpeqb xmm2, xmm1
                                                    pcmpeqb xmm1, xmm3
                                                    por xmm1, xmm2
                                                    pmovmskb ebx, xmm1
                                                    add eax, 10h
                                                    test ebx, ebx
                                                    je 00007FF53D07B0B4h
                                                    bsf ebx, ebx
                                                    sub eax, 10h
                                                    add eax, ebx
                                                    movzx ebx, byte ptr [eax]
                                                    test ebx, ebx
                                                    je 00007FF53D07B14Ch
                                                    add eax, 01h
                                                    Programming Language:
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [LNK] VS2013 build 21005
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x100240x28.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x270000xcbc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xfcc80x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0xc0000x100.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000xa4f70xb0002535bd00e9d839d72ef1b255cf48181aFalse0.5609241832386364data6.490742379297465IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0xc0000x45dc0x50006ff5dc876b59837be9710ec2e6e12603False0.34423828125data4.176988594228439IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x110000x153240x16000f580f48abfe4f99a0c7d40434a30c899False0.6173428622159091DOS executable (block device driver \377\377\200)6.817672467319551IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .reloc0x270000xcbc0x100040d1b92133b27bf4d9cf9e2b9ac1efe0False0.660400390625data5.7873346574246IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    DLLImport
                                                    KERNEL32.dllVirtualProtect, ExitProcess, OpenProcess, Sleep, ExitThread, GetLastError, CloseHandle, WriteConsoleW, SetFilePointerEx, SetStdHandle, GetCommandLineA, SetLastError, GetCurrentThreadId, EncodePointer, DecodePointer, GetModuleHandleExW, GetProcAddress, MultiByteToWideChar, WideCharToMultiByte, GetProcessHeap, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, GetModuleFileNameA, WriteFile, GetModuleFileNameW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, IsDebuggerPresent, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, EnterCriticalSection, LeaveCriticalSection, HeapFree, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, LoadLibraryExW, RtlUnwind, OutputDebugStringW, HeapAlloc, HeapReAlloc, GetStringTypeW, HeapSize, LCMapStringW, FlushFileBuffers, GetConsoleCP, GetConsoleMode, CreateFileW
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-09-30T16:03:49.107021+02002025452ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)1192.168.2.11508211.1.1.153UDP
                                                    2024-09-30T16:03:50.683722+02002025453ET MALWARE Observed GandCrab Ransomware Domain (zonealarm .bit in DNS Lookup)1192.168.2.11508261.1.1.153UDP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 30, 2024 16:04:47.465859890 CEST4971553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.470731974 CEST53497151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.470874071 CEST4971553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.470874071 CEST4971553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.475739002 CEST53497151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.475819111 CEST4971553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.480587006 CEST53497151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.934752941 CEST53497151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.934928894 CEST4971553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.940258026 CEST53497151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.940331936 CEST4971553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.386889935 CEST4971653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.391810894 CEST53497161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.391911030 CEST4971653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.392049074 CEST4971653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.396806955 CEST53497161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.396883011 CEST4971653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.401705027 CEST53497161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.929912090 CEST53497161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.930023909 CEST4971653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.935144901 CEST53497161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.935235977 CEST4971653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.160769939 CEST4971753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.165715933 CEST53497171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.165816069 CEST4971753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.165816069 CEST4971753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.170859098 CEST53497171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.170914888 CEST4971753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.175817966 CEST53497171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.682041883 CEST53497171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.682176113 CEST4971753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.687602997 CEST53497171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.687652111 CEST4971753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.839179993 CEST4971853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.844540119 CEST53497181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.847563028 CEST4971853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.847604036 CEST4971853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.855381012 CEST53497181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.855546951 CEST4971853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.863993883 CEST53497181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.315733910 CEST53497181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.316267014 CEST4971853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.321922064 CEST53497181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.321988106 CEST4971853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.452917099 CEST4971953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.457834959 CEST53497191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.457967043 CEST4971953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.457967997 CEST4971953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.463665962 CEST53497191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.463726044 CEST4971953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.468493938 CEST53497191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.906358957 CEST53497191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.907645941 CEST4971953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.912785053 CEST53497191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.914402008 CEST4971953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.632913113 CEST4972053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.637768984 CEST53497201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.637866974 CEST4972053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.637902975 CEST4972053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.642632961 CEST53497201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.642688036 CEST4972053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.647464037 CEST53497201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.154913902 CEST53497201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.155303955 CEST4972053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.161262989 CEST53497201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.161302090 CEST4972053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.226733923 CEST4972153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.231842041 CEST53497211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.231906891 CEST4972153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.231929064 CEST4972153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.236733913 CEST53497211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.236793995 CEST4972153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.241642952 CEST53497211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.791217089 CEST53497211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.792623043 CEST4972153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.797863007 CEST53497211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.797960043 CEST4972153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.096319914 CEST4972253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.101274967 CEST53497221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.101363897 CEST4972253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.101402998 CEST4972253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.106236935 CEST53497221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.106348038 CEST4972253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.111191034 CEST53497221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.550004005 CEST53497221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.550132990 CEST4972253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.555893898 CEST53497221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.556233883 CEST4972253192.168.2.111.1.1.1
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 30, 2024 16:03:47.397953987 CEST5932253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:47.409701109 CEST53593221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:47.632883072 CEST5505653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:47.680965900 CEST53550561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:47.798232079 CEST5505753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:47.805489063 CEST53550571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:47.842344999 CEST5505853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:47.871238947 CEST53550581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:47.873744965 CEST5505953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:47.889507055 CEST53550591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:47.892214060 CEST5506053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:47.926399946 CEST53550601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:47.926783085 CEST5506153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:47.935403109 CEST53550611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:49.029576063 CEST5081953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:49.088488102 CEST53508191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:49.099518061 CEST5082053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:49.106600046 CEST53508201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:49.107021093 CEST5082153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:49.117207050 CEST53508211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:49.117605925 CEST5082253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:49.131844997 CEST53508221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:49.132158041 CEST5082353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:49.149068117 CEST53508231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:49.149420977 CEST5082453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:49.158987045 CEST53508241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:50.676156044 CEST5082553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:50.683156013 CEST53508251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:50.683722019 CEST5082653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:50.692665100 CEST53508261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:50.693043947 CEST5082753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:50.707458973 CEST53508271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:50.707788944 CEST5082853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:50.717467070 CEST53508281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:50.717767954 CEST5082953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:50.737943888 CEST53508291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:51.828855038 CEST5083053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:51.836666107 CEST53508301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:51.837125063 CEST5083153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:51.857816935 CEST53508311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:51.858403921 CEST5083253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:51.867506981 CEST53508321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:51.867768049 CEST5083353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:51.887192965 CEST53508331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:51.887562990 CEST5083453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:51.896087885 CEST53508341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:53.349147081 CEST5551853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:53.435378075 CEST53555181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:53.454124928 CEST5551953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:53.461950064 CEST53555191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:53.462374926 CEST5552053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:53.478097916 CEST53555201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:53.478559017 CEST5552153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:53.490907907 CEST53555211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:53.491250992 CEST5552253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:53.506895065 CEST53555221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:53.507256985 CEST5552353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:53.516374111 CEST53555231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:54.606419086 CEST5059053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:54.657802105 CEST53505901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:54.671022892 CEST5059153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:54.678339005 CEST53505911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:54.678781033 CEST5059253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:54.687315941 CEST53505921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:54.687797070 CEST5059353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:54.698839903 CEST53505931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:54.699287891 CEST5059453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:54.707211018 CEST53505941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:54.711653948 CEST5059553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:54.727705956 CEST53505951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:56.074201107 CEST5059653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:56.836749077 CEST53505961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:56.837495089 CEST5059753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:56.847038984 CEST53505971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:56.847398043 CEST5059853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:56.861613989 CEST53505981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:56.862097979 CEST5059953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:56.877643108 CEST53505991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:56.878218889 CEST5060053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:56.891129971 CEST53506001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:57.992733002 CEST5060153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:57.999921083 CEST53506011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:58.000353098 CEST5060253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:58.009596109 CEST53506021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:58.009941101 CEST5060353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:58.032846928 CEST53506031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:58.033251047 CEST5060453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:58.042644978 CEST53506041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:58.042978048 CEST5060553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:58.057732105 CEST53506051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:59.237570047 CEST5671153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:59.285491943 CEST53567111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:59.296691895 CEST5671253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:59.303621054 CEST53567121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:59.304019928 CEST5671353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:59.319468021 CEST53567131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:59.319787979 CEST5671453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:59.330456972 CEST53567141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:59.330770016 CEST5671553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:59.350780964 CEST53567151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:03:59.351471901 CEST5671653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:03:59.366853952 CEST53567161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:00.454020023 CEST5388853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:00.610440969 CEST53538881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:00.623466015 CEST5388953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:00.630398989 CEST53538891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:00.630812883 CEST5389053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:00.649519920 CEST53538901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:00.650238037 CEST5389153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:00.659753084 CEST53538911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:00.660161018 CEST5389253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:00.670264006 CEST53538921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:00.670676947 CEST5389353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:00.686781883 CEST53538931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:01.855673075 CEST6213253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:01.863192081 CEST53621321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:01.863650084 CEST6213353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:01.873826027 CEST53621331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:01.874269009 CEST6213453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:01.883842945 CEST53621341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:01.884248972 CEST6213553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:01.908102989 CEST53621351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:01.908628941 CEST6213653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:01.928551912 CEST53621361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:03.091366053 CEST6213753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:03.098648071 CEST53621371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:03.099628925 CEST6213853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:03.116215944 CEST53621381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:03.116621017 CEST6213953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:03.124727964 CEST53621391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:03.125299931 CEST6214053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:03.135585070 CEST53621401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:03.137382984 CEST6214153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:03.150015116 CEST53621411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:04.287630081 CEST6122653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:04.336779118 CEST53612261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:04.348058939 CEST6122753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:05.393795013 CEST53612271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:05.394287109 CEST6122853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:05.404474974 CEST53612281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:05.404962063 CEST6122953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:05.420907021 CEST53612291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:05.421288013 CEST6123053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:05.437273026 CEST53612301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:05.437685013 CEST6123153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:05.453911066 CEST53612311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:06.981375933 CEST6130553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:07.031116009 CEST53613051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:07.042352915 CEST6130653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:07.049798012 CEST53613061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:07.050723076 CEST6130753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:07.068737984 CEST53613071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:07.069257975 CEST6130853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:07.081748009 CEST53613081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:07.082108021 CEST6130953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:07.092657089 CEST53613091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:07.092994928 CEST6131053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:07.109291077 CEST53613101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:08.296057940 CEST6131153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:08.304173946 CEST53613111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:08.304882050 CEST6131253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:08.320239067 CEST53613121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:08.320780039 CEST6131353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:08.336157084 CEST53613131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:08.336591005 CEST6131453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:08.361104012 CEST53613141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:08.361706018 CEST6131553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:08.377526045 CEST53613151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:09.534271002 CEST5817053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:09.697345018 CEST53581701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:09.713671923 CEST5817153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:09.721174002 CEST53581711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:09.721735954 CEST5817253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:09.741790056 CEST53581721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:09.742266893 CEST5817353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:09.749995947 CEST53581731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:09.750449896 CEST5817453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:09.766967058 CEST53581741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:09.767393112 CEST5817553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:09.779350996 CEST53581751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:10.999357939 CEST5817653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:11.006304979 CEST53581761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:11.006737947 CEST5817753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:11.022349119 CEST53581771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:11.022906065 CEST5817853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:11.030344963 CEST53581781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:11.030731916 CEST5817953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:11.038984060 CEST53581791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:11.039280891 CEST5818053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:11.047502995 CEST53581801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:12.208085060 CEST5371053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:12.257260084 CEST53537101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:12.267612934 CEST5371153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:12.274775028 CEST53537111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:12.275348902 CEST5371253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:12.290659904 CEST53537121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:12.291404009 CEST5371353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:12.307190895 CEST53537131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:12.307531118 CEST5371453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:12.324875116 CEST53537141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:12.325329065 CEST5371553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:12.341464043 CEST53537151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:13.546014071 CEST5371653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:13.553267956 CEST53537161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:13.553754091 CEST5371753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:13.570120096 CEST53537171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:13.570485115 CEST5371853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:13.578596115 CEST53537181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:13.578900099 CEST5371953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:13.592706919 CEST53537191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:13.593044043 CEST5372053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:13.603951931 CEST53537201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:14.746707916 CEST6334553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:15.008519888 CEST53633451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:15.019551039 CEST6334653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:15.027267933 CEST53633461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:15.027896881 CEST6334753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:15.037590981 CEST53633471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:15.038031101 CEST6334853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:15.045941114 CEST53633481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:15.046416044 CEST6334953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:15.054208040 CEST53633491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:15.054730892 CEST6335053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:15.062285900 CEST53633501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:16.308128119 CEST6335153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:16.315550089 CEST53633511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:16.315968990 CEST6335253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:16.326114893 CEST53633521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:16.326462030 CEST6335353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:16.336224079 CEST53633531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:16.336654902 CEST6335453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:16.345469952 CEST53633541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:16.345911026 CEST6335553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:16.354556084 CEST53633551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:17.529544115 CEST6196953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:17.578751087 CEST53619691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:17.589742899 CEST6197053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:17.596712112 CEST53619701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:17.597275972 CEST6197153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:17.605592012 CEST53619711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:17.605940104 CEST6197253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:17.615161896 CEST53619721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:17.615679979 CEST6197353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:17.630722046 CEST53619731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:17.631155014 CEST6197453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:17.640847921 CEST53619741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:18.811594963 CEST6197553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:18.993335009 CEST53619751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:18.994154930 CEST6197653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:19.014178038 CEST53619761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:19.014723063 CEST6197753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:19.025468111 CEST53619771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:19.025816917 CEST6197853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:19.042473078 CEST53619781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:19.042843103 CEST6197953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:19.053687096 CEST53619791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:20.211648941 CEST5944553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:20.368280888 CEST53594451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:20.378281116 CEST5944653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:20.385109901 CEST53594461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:20.385562897 CEST5944753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:20.400547028 CEST53594471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:20.401206970 CEST5944853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:20.408437967 CEST53594481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:20.408689022 CEST5944953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:20.423118114 CEST53594491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:20.423410892 CEST5945053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:20.433808088 CEST53594501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:21.941957951 CEST5945153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:21.949076891 CEST53594511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:21.950232983 CEST5945253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:21.966165066 CEST53594521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:21.966963053 CEST5945353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:21.981168985 CEST53594531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:21.995604992 CEST5945453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:22.002841949 CEST53594541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:22.012712955 CEST5945553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:22.022468090 CEST53594551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:23.400167942 CEST5649453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:23.448793888 CEST53564941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:23.458935976 CEST5649553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:23.467268944 CEST53564951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:23.467716932 CEST5649653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:23.484067917 CEST53564961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:23.484426975 CEST5649753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:23.499228954 CEST53564971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:23.499535084 CEST5649853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:23.509365082 CEST53564981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:23.509670019 CEST5649953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:23.530438900 CEST53564991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:24.737256050 CEST5650053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:24.745419979 CEST53565001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:24.745918989 CEST5650153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:24.753271103 CEST53565011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:24.753571987 CEST5650253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:24.768012047 CEST53565021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:24.768297911 CEST5650353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:24.775418997 CEST53565031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:24.775731087 CEST5650453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:24.784169912 CEST53565041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:25.880845070 CEST6034753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:25.966466904 CEST53603471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:25.976509094 CEST6034853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:25.983437061 CEST53603481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:25.984149933 CEST6034953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:25.991871119 CEST53603491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:25.992275000 CEST6035053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:26.039942026 CEST53603501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:26.040543079 CEST6035153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:26.056350946 CEST53603511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:26.056608915 CEST6035253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:26.064404964 CEST53603521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:27.236747026 CEST6035353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:27.243802071 CEST53603531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:27.244339943 CEST6035453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:27.259430885 CEST53603541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:27.259820938 CEST6035553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:27.276513100 CEST53603551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:27.276892900 CEST6035653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:27.287839890 CEST53603561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:27.288222075 CEST6035753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:27.302649975 CEST53603571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:28.479434013 CEST5048053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:28.527673960 CEST53504801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:28.537770987 CEST5048153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:28.546701908 CEST53504811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:28.547226906 CEST5048253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:28.555650949 CEST53504821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:28.556001902 CEST5048353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:28.568897963 CEST53504831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:28.569228888 CEST5048453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:28.579083920 CEST53504841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:28.579566956 CEST5048553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:28.589957952 CEST53504851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:29.710371017 CEST5048653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:29.719471931 CEST53504861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:29.721838951 CEST5048753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:29.729110956 CEST53504871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:29.730612040 CEST5048853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:29.738178968 CEST53504881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:29.739330053 CEST5048953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:29.754086971 CEST53504891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:29.754452944 CEST5049053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:29.764384031 CEST53504901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:30.850526094 CEST6168253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:30.937041998 CEST53616821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:30.947144032 CEST6168353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:30.955058098 CEST53616831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:30.955631018 CEST6168453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:30.969449997 CEST53616841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:30.969863892 CEST6168553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:30.979613066 CEST53616851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:30.980148077 CEST6168653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:31.000426054 CEST53616861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:31.000895977 CEST6168753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:31.020565033 CEST53616871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:32.091449976 CEST6168853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:32.098752975 CEST53616881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:32.099128962 CEST6168953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:32.114301920 CEST53616891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:32.114670992 CEST6169053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:32.124341011 CEST53616901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:32.124763966 CEST6169153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:32.132179976 CEST53616911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:32.132370949 CEST6169253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:32.140723944 CEST53616921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:33.422940016 CEST5960753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:33.510096073 CEST53596071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:33.519455910 CEST5960853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:33.530755997 CEST53596081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:33.531264067 CEST5960953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:33.538676023 CEST53596091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:33.538969994 CEST5961053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:33.548229933 CEST53596101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:33.548487902 CEST5961153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:33.556344986 CEST53596111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:33.556602955 CEST5961253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:33.564141035 CEST53596121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:34.563090086 CEST5961353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:34.570430994 CEST53596131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:34.570920944 CEST5961453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:34.586143017 CEST53596141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:34.586529970 CEST5961553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:34.594559908 CEST53596151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:34.594779015 CEST5961653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:34.603159904 CEST53596161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:34.603363037 CEST5961753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:34.611448050 CEST53596171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:35.571561098 CEST5744753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:35.620667934 CEST53574471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:35.630676031 CEST5744853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:35.639117002 CEST53574481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:35.639755011 CEST5744953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:35.656002998 CEST53574491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:35.659584045 CEST5745053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:35.675667048 CEST53574501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:35.679867029 CEST5745153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:35.687429905 CEST53574511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:35.691569090 CEST5745253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:35.700293064 CEST53574521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:36.642393112 CEST5745353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:36.650800943 CEST53574531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:36.651139021 CEST5745453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:36.659907103 CEST53574541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:36.660154104 CEST5745553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:36.677251101 CEST53574551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:36.677498102 CEST5745653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:36.685513973 CEST53574561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:36.685770988 CEST5745753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:36.694166899 CEST53574571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:37.595499039 CEST5745853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:37.602462053 CEST53574581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:37.602919102 CEST5745953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:37.614917040 CEST53574591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:37.616792917 CEST5746053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:37.634232044 CEST53574601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:37.634646893 CEST5746153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:37.648922920 CEST53574611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:37.649279118 CEST5746253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:37.656883001 CEST53574621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:38.526057959 CEST5604153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:38.782001019 CEST53560411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:38.789582968 CEST5604253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:38.798826933 CEST53560421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:38.799359083 CEST5604353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:38.821994066 CEST53560431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:38.822572947 CEST5604453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:38.838181019 CEST53560441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:38.838584900 CEST5604553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:38.846627951 CEST53560451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:38.846837044 CEST5604653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:38.866648912 CEST53560461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:39.731370926 CEST5604753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:39.738771915 CEST53560471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:39.739177942 CEST5604853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:39.746893883 CEST53560481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:39.747205019 CEST5604953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:39.763490915 CEST53560491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:39.763863087 CEST5605053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:39.770860910 CEST53560501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:39.771177053 CEST5605153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:39.779083967 CEST53560511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:40.597038984 CEST6322253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:40.682077885 CEST53632221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:40.690278053 CEST6322353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:40.698074102 CEST53632231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:40.699153900 CEST6322453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:40.714271069 CEST53632241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:40.717782974 CEST6322553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:40.737967014 CEST53632251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:40.742422104 CEST6322653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:40.749912024 CEST53632261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:40.750323057 CEST6322753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:40.758110046 CEST53632271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:41.567104101 CEST6322853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:42.381412029 CEST53632281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:42.382127047 CEST6322953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:42.399029016 CEST53632291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:42.399621964 CEST6323053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:42.413646936 CEST53632301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:42.414079905 CEST6323153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:42.421993017 CEST53632311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:42.422332048 CEST6323253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:42.432146072 CEST53632321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:43.204268932 CEST6323353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:43.352175951 CEST53632331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:43.352864027 CEST6323453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:43.361932039 CEST53632341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:43.362364054 CEST6323553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:43.379834890 CEST53632351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:43.380310059 CEST6323653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:43.389545918 CEST53632361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:43.390188932 CEST6323753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:43.398680925 CEST53632371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:44.150959015 CEST6323853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:44.304833889 CEST53632381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:44.305594921 CEST6323953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:44.312887907 CEST53632391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:44.313292980 CEST6324053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:44.327604055 CEST53632401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:44.327964067 CEST6324153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:44.336777925 CEST53632411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:44.336977959 CEST6324253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:44.353435040 CEST53632421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.080777884 CEST6324353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.088253975 CEST53632431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.088836908 CEST6324453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.096915007 CEST53632441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.097557068 CEST6324553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.112756014 CEST53632451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.113097906 CEST6324653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.120394945 CEST53632461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.120738029 CEST6324753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.128200054 CEST53632471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.831598997 CEST6472353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.916619062 CEST53647231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.926100016 CEST6472453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.933974028 CEST53647241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.934477091 CEST6472553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.945554972 CEST53647251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.946060896 CEST6472653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.955214024 CEST53647261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.955578089 CEST6472753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.963253021 CEST53647271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:45.963529110 CEST6472853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:45.971112013 CEST53647281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:46.664391041 CEST6472953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:46.671577930 CEST53647291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:46.672059059 CEST6473053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:46.692682028 CEST53647301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:46.693116903 CEST6473153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:46.709444046 CEST53647311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:46.709949970 CEST6473253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:46.730784893 CEST53647321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:46.731321096 CEST6473353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:46.740237951 CEST53647331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.400863886 CEST5112853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.450015068 CEST53511281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.457556009 CEST5112953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.465507984 CEST53511291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.935235023 CEST5113053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.943288088 CEST53511301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.943519115 CEST5113153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.958163023 CEST53511311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.958353996 CEST5113253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.966937065 CEST53511321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:47.967104912 CEST5113353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:47.975147009 CEST53511331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:48.620944977 CEST5113453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:48.629255056 CEST53511341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:48.629703999 CEST5113553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:48.645946026 CEST53511351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:48.646342993 CEST5113653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:48.655735970 CEST53511361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:48.656088114 CEST5113753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:48.669296980 CEST53511371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:48.669651985 CEST5113853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:48.683312893 CEST53511381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:49.320671082 CEST5113953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.036127090 CEST53511391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.036577940 CEST5114053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.044127941 CEST53511401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.044437885 CEST5114153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.052251101 CEST53511411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.052485943 CEST5114253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.073954105 CEST53511421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.074291945 CEST5114353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.092200994 CEST53511431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.734767914 CEST5426753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.743048906 CEST53542671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.778858900 CEST5426853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.788976908 CEST53542681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.789374113 CEST5426953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.796871901 CEST53542691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.797152042 CEST5427053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.807179928 CEST53542701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.807449102 CEST5427153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.814907074 CEST53542711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:50.815179110 CEST5427253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:50.822787046 CEST53542721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:51.416765928 CEST5427353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:51.423712969 CEST53542731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:51.424163103 CEST5427453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:51.431791067 CEST53542741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:51.432133913 CEST5427553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:51.441293001 CEST53542751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:51.441513062 CEST5427653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:51.448802948 CEST53542761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:51.449004889 CEST5427753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:51.464116096 CEST53542771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.032001019 CEST5427853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.040864944 CEST53542781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.041357994 CEST5427953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.052123070 CEST53542791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.052541971 CEST5428053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.060431004 CEST53542801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.060659885 CEST5428153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.068263054 CEST53542811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.068502903 CEST5428253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.079049110 CEST53542821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.623692036 CEST5428353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.630850077 CEST53542831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.631211042 CEST5428453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.650851011 CEST53542841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.651117086 CEST5428553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.659377098 CEST53542851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.659678936 CEST5428653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.667408943 CEST53542861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:52.667649031 CEST5428753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:52.682557106 CEST53542871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:53.228163004 CEST5428853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:53.235227108 CEST53542881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:53.235608101 CEST5428953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:53.249922991 CEST53542891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:53.250307083 CEST5429053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:53.258213997 CEST53542901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:53.258421898 CEST5429153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:53.267873049 CEST53542911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:53.268120050 CEST5429253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:53.275789976 CEST53542921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:53.963267088 CEST6298053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.055732012 CEST53629801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.063302994 CEST6298153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.070451975 CEST53629811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.070832968 CEST6298253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.078763008 CEST53629821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.079173088 CEST6298353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.087455034 CEST53629831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.087711096 CEST6298453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.095500946 CEST53629841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.095751047 CEST6298553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.111157894 CEST53629851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.616667032 CEST6298653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.623800993 CEST53629861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.624180079 CEST6298753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.630956888 CEST53629871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.631176949 CEST6298853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.646595955 CEST53629881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.646893978 CEST6298953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.661380053 CEST53629891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:54.661662102 CEST6299053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:54.677218914 CEST53629901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.171997070 CEST6299153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.179794073 CEST53629911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.180171967 CEST6299253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.188234091 CEST53629921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.188555002 CEST6299353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.197125912 CEST53629931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.197343111 CEST6299453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.206298113 CEST53629941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.206559896 CEST6299553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.216953993 CEST53629951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.691967010 CEST5437553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.742280960 CEST53543751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.749983072 CEST5437653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.757857084 CEST53543761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.758219957 CEST5437753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.765604019 CEST53543771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.765881062 CEST5437853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.782012939 CEST53543781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.782300949 CEST5437953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.789581060 CEST53543791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:55.789788961 CEST5438053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:55.799020052 CEST53543801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.294055939 CEST5438153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.301989079 CEST53543811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.306112051 CEST5438253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.314131975 CEST53543821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.314475060 CEST5438353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.323225021 CEST53543831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.323988914 CEST5438453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.347783089 CEST53543841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.348160028 CEST5438553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.355468988 CEST53543851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.795636892 CEST5438653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.806607962 CEST53543861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.807188988 CEST5438753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.822257042 CEST53543871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.822695017 CEST5438853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.831594944 CEST53543881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.831836939 CEST5438953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.842083931 CEST53543891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:56.842327118 CEST5439053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:56.851170063 CEST53543901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.294154882 CEST5439153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.302054882 CEST53543911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.302613974 CEST5439253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.310596943 CEST53543921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.310905933 CEST5439353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.320215940 CEST53543931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.320804119 CEST5439453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.328283072 CEST53543941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.328644991 CEST5439553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.336616039 CEST53543951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.778863907 CEST5439653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.785934925 CEST53543961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.786391973 CEST5439753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.794851065 CEST53543971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.795207024 CEST5439853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.802653074 CEST53543981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.802901983 CEST5439953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.810511112 CEST53543991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:57.810761929 CEST5440053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:57.818612099 CEST53544001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.227099895 CEST5182653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.315054893 CEST53518261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.322304964 CEST5182753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.329849005 CEST53518271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.330256939 CEST5182853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.337655067 CEST53518281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.338046074 CEST5182953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.347700119 CEST53518291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.347958088 CEST5183053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.355885983 CEST53518301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.356167078 CEST5183153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.365712881 CEST53518311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.770442009 CEST5183253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.869823933 CEST53518321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.870629072 CEST5183353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.878515005 CEST53518331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.878861904 CEST5183453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.886473894 CEST53518341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.886713982 CEST5183553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.896030903 CEST53518351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:58.896403074 CEST5183653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:58.904687881 CEST53518361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.297887087 CEST5183753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.304934978 CEST53518371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.305377007 CEST5183853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.312912941 CEST53518381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.313180923 CEST5183953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.329603910 CEST53518391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.329834938 CEST5184053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.345633030 CEST53518401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.345920086 CEST5184153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.354187012 CEST53518411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.782042980 CEST5184253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.789711952 CEST53518421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.790081024 CEST5184353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.797369957 CEST53518431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.797652006 CEST5184453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.805442095 CEST53518441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.805763006 CEST5184553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.814049006 CEST53518451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:04:59.814344883 CEST5184653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:04:59.822900057 CEST53518461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.187239885 CEST5184753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.194535971 CEST53518471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.194963932 CEST5184853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.210370064 CEST53518481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.210783958 CEST5184953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.218848944 CEST53518491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.219058037 CEST5185053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.226843119 CEST53518501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.227055073 CEST5185153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.235249996 CEST53518511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.594161987 CEST5185253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.601340055 CEST53518521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.601950884 CEST5185353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.609399080 CEST53518531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.609694958 CEST5185453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.617897034 CEST53518541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.618174076 CEST5185553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.628146887 CEST53518551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.628402948 CEST5185653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.637717962 CEST53518561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.977452993 CEST6398053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:00.988385916 CEST53639801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:00.995570898 CEST6398153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.002465010 CEST53639811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.002882957 CEST6398253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.010458946 CEST53639821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.010726929 CEST6398353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.021387100 CEST53639831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.021749973 CEST6398453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.029055119 CEST53639841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.029306889 CEST6398553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.282668114 CEST53639851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.625197887 CEST6398653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.632359028 CEST53639861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.632983923 CEST6398753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.641716003 CEST53639871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.642026901 CEST6398853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.649665117 CEST53639881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.649926901 CEST6398953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.665033102 CEST53639891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:01.665478945 CEST6399053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:01.672703981 CEST53639901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.001776934 CEST6399153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.009691000 CEST53639911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.010278940 CEST6399253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.026263952 CEST53639921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.026597977 CEST6399353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.039841890 CEST53639931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.040154934 CEST6399453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.057096004 CEST53639941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.057336092 CEST6399553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.066117048 CEST53639951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.463725090 CEST6399653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.471477032 CEST53639961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.483169079 CEST6399753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.491008043 CEST53639971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.505887985 CEST6399853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.521517992 CEST53639981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.522099972 CEST6399953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.536942005 CEST53639991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.538053989 CEST6400053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.545844078 CEST53640001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.870035887 CEST6400153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.876892090 CEST53640011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.877336025 CEST6400253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.886986017 CEST53640021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.887300968 CEST6400353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.897954941 CEST53640031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.898163080 CEST6400453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.906904936 CEST53640041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:02.907049894 CEST6400553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:02.915596008 CEST53640051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:03.232323885 CEST6400653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:03.239275932 CEST53640061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:03.239761114 CEST6400753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:03.249654055 CEST53640071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:03.250021935 CEST6400853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:03.256980896 CEST53640081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:03.257164001 CEST6400953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:03.267438889 CEST53640091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:03.267663956 CEST6401053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:03.276134014 CEST53640101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:03.563322067 CEST4973053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.119267941 CEST53497301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.127182007 CEST4973153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.134474039 CEST53497311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.134912014 CEST4973253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.151204109 CEST53497321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.151686907 CEST4973353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.164022923 CEST53497331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.164367914 CEST4973453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.176042080 CEST53497341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.176400900 CEST4973553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.184489965 CEST53497351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.476335049 CEST4973653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.484221935 CEST53497361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.484649897 CEST4973753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.494529963 CEST53497371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.494865894 CEST4973853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.503040075 CEST53497381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.503375053 CEST4973953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.520575047 CEST53497391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.520944118 CEST4974053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.531461000 CEST53497401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.817255020 CEST4974153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.824585915 CEST53497411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.825731039 CEST4974253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.834780931 CEST53497421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.835103035 CEST4974353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.842367887 CEST53497431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.842567921 CEST4974453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.854196072 CEST53497441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:04.854708910 CEST4974553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:04.863455057 CEST53497451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.148825884 CEST4974653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.345813990 CEST53497461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.346319914 CEST4974753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.355393887 CEST53497471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.355796099 CEST4974853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.371164083 CEST53497481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.371625900 CEST4974953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.379452944 CEST53497491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:05.379630089 CEST4975053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:05.386586905 CEST53497501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.198451042 CEST4975153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.205008030 CEST53497511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.207973957 CEST4975253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.216595888 CEST53497521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.219769955 CEST4975353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.228921890 CEST53497531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.231741905 CEST4975453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.247901917 CEST53497541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.250169039 CEST4975553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.258550882 CEST53497551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.516191006 CEST4975653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.523674965 CEST53497561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.524120092 CEST4975753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.532346964 CEST53497571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.532672882 CEST4975853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.541296959 CEST53497581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.541507006 CEST4975953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.549505949 CEST53497591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.549751997 CEST4976053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.557760954 CEST53497601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.809099913 CEST6407953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.967264891 CEST53640791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.974435091 CEST6408053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.981817007 CEST53640801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.982145071 CEST6408153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.990622997 CEST53640811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.990880966 CEST6408253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:06.998410940 CEST53640821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:06.998585939 CEST6408353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.008851051 CEST53640831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.009056091 CEST6408453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.018627882 CEST53640841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.265808105 CEST6408553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.274144888 CEST53640851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.274472952 CEST6408653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.282157898 CEST53640861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.282340050 CEST6408753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.291516066 CEST53640871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.291766882 CEST6408853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.299352884 CEST53640881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.299602985 CEST6408953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.308556080 CEST53640891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.556988955 CEST6409053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.564784050 CEST53640901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.565130949 CEST6409153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.573903084 CEST53640911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.574476004 CEST6409253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.583506107 CEST53640921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.583678961 CEST6409353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.593651056 CEST53640931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.593848944 CEST6409453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.603869915 CEST53640941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.833379030 CEST6409553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.844738007 CEST53640951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.845211983 CEST6409653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.853120089 CEST53640961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.853341103 CEST6409753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.863070011 CEST53640971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.863279104 CEST6409853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.873229980 CEST53640981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:07.873486042 CEST6409953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:07.881139040 CEST53640991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.112533092 CEST6410053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.119924068 CEST53641001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.120253086 CEST6410153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.130013943 CEST53641011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.130223989 CEST6410253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.138586044 CEST53641021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.138797998 CEST6410353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.147253036 CEST53641031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.147433043 CEST6410453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.156975031 CEST53641041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.382703066 CEST6410553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.390141964 CEST53641051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.390641928 CEST6410653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.405989885 CEST53641061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.406416893 CEST6410753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.414294958 CEST53641071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.414465904 CEST6410853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.422420025 CEST53641081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.422611952 CEST6410953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.446954966 CEST53641091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.654752970 CEST6056553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.910636902 CEST53605651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.917826891 CEST6056653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.925929070 CEST53605661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.926342964 CEST6056753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.945589066 CEST53605671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.945954084 CEST6056853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.962122917 CEST53605681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.962340117 CEST6056953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.969650030 CEST53605691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:08.969961882 CEST6057053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:08.977685928 CEST53605701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.186676979 CEST6057153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.195703983 CEST53605711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.196044922 CEST6057253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.204880953 CEST53605721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.205218077 CEST6057353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.213116884 CEST53605731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.213449001 CEST6057453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.221060038 CEST53605741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.221374035 CEST6057553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.229831934 CEST53605751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.435925961 CEST6057653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.443181992 CEST53605761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.443619967 CEST6057753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.450952053 CEST53605771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.451251030 CEST6057853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.460340023 CEST53605781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.460565090 CEST6057953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.469206095 CEST53605791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.469485998 CEST6058053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.477446079 CEST53605801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.671861887 CEST6058153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.679717064 CEST53605811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.680241108 CEST6058253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.690781116 CEST53605821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.691123962 CEST6058353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.701442957 CEST53605831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.701756001 CEST6058453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.709672928 CEST53605841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.709912062 CEST6058553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.717926979 CEST53605851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.919224024 CEST6058653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.926336050 CEST53605861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.926750898 CEST6058753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.934312105 CEST53605871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.934613943 CEST6058853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.942301035 CEST53605881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.942585945 CEST6058953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.952641964 CEST53605891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:09.952899933 CEST6059053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:09.961074114 CEST53605901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.154891968 CEST6059153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.163033962 CEST53605911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.163395882 CEST6059253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.171156883 CEST53605921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.171519041 CEST6059353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.179213047 CEST53605931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.179441929 CEST6059453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.189198017 CEST53605941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.189551115 CEST6059553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.198618889 CEST53605951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.402628899 CEST6059653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.409861088 CEST53605961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.410218954 CEST6059753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.420655966 CEST53605971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.420922041 CEST6059853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.430295944 CEST53605981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.430561066 CEST6059953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.437906027 CEST53605991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.438219070 CEST6060053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.446307898 CEST53606001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.626502991 CEST6060153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.634164095 CEST53606011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.634661913 CEST6060253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.642579079 CEST53606021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.642930031 CEST6060353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.652357101 CEST53606031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.652580976 CEST6060453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.660384893 CEST53606041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.660594940 CEST6060553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.676611900 CEST53606051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.867623091 CEST6060653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.874588966 CEST53606061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.874978065 CEST6060753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.882987022 CEST53606071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.883220911 CEST6060853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.891994953 CEST53606081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.892235994 CEST6060953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.903520107 CEST53606091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:10.903763056 CEST6061053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:10.914664984 CEST53606101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.099293947 CEST6061153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.223617077 CEST53606111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.224222898 CEST6061253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.232260942 CEST53606121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.232685089 CEST6061353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.241544962 CEST53606131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.241822004 CEST6061453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.249990940 CEST53606141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.250231028 CEST6061553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.257467031 CEST53606151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.419128895 CEST5228153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.467832088 CEST53522811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.475337982 CEST5228253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.483004093 CEST53522821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.483520031 CEST5228353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.491023064 CEST53522831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.491400957 CEST5228453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.498867989 CEST53522841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.499129057 CEST5228553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.514673948 CEST53522851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.515140057 CEST5228653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.524724007 CEST53522861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.687274933 CEST5228753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.694679022 CEST53522871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.695091963 CEST5228853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.703074932 CEST53522881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.703392982 CEST5228953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.719177008 CEST53522891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.719543934 CEST5229053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.730251074 CEST53522901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.730551958 CEST5229153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.740802050 CEST53522911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.912574053 CEST5229253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.920253038 CEST53522921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.920615911 CEST5229353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.928301096 CEST53522931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.928564072 CEST5229453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.936547041 CEST53522941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.936774015 CEST5229553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.943924904 CEST53522951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:11.944196939 CEST5229653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:11.952310085 CEST53522961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.129961014 CEST5229753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.137418985 CEST53522971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.137737989 CEST5229853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.145252943 CEST53522981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.145495892 CEST5229953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.153043985 CEST53522991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.153306961 CEST5230053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.160501003 CEST53523001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.682356119 CEST5230153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.690615892 CEST53523011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.865430117 CEST5230253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.872667074 CEST53523021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.873213053 CEST5230353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.881536961 CEST53523031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.881843090 CEST5230453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.889833927 CEST53523041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.890100956 CEST5230553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.900830030 CEST53523051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:12.901102066 CEST5230653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:12.908994913 CEST53523061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.063249111 CEST5230753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.071286917 CEST53523071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.071645021 CEST5230853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.082920074 CEST53523081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.083259106 CEST5230953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.091080904 CEST53523091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.091377974 CEST5231053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.101130962 CEST53523101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.101521969 CEST5231153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.110130072 CEST53523111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.260442972 CEST4962453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.346955061 CEST53496241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.354974985 CEST4962553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.362365961 CEST53496251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.362831116 CEST4962653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.370825052 CEST53496261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.371212959 CEST4962753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.378753901 CEST53496271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.379045010 CEST4962853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.388580084 CEST53496281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.388904095 CEST4962953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.405129910 CEST53496291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.556787968 CEST4963053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.567395926 CEST53496301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.567807913 CEST4963153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.575340033 CEST53496311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.575567007 CEST4963253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.585155010 CEST53496321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.585355043 CEST4963353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.595474005 CEST53496331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.595663071 CEST4963453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.603451967 CEST53496341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.749999046 CEST4963553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.757106066 CEST53496351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.757519960 CEST4963653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.766925097 CEST53496361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.767311096 CEST4963753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.776031017 CEST53496371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.776366949 CEST4963853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.784972906 CEST53496381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.785315990 CEST4963953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.793528080 CEST53496391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.957495928 CEST4964053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.965051889 CEST53496401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.965471983 CEST4964153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.976349115 CEST53496411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.976629972 CEST4964253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.984446049 CEST53496421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.984741926 CEST4964353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:13.992924929 CEST53496431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:13.993149996 CEST4964453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.001133919 CEST53496441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.141689062 CEST4964553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.148869991 CEST53496451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.149460077 CEST4964653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.164772034 CEST53496461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.166657925 CEST4964753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.176157951 CEST53496471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.176902056 CEST4964853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.184405088 CEST53496481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.184989929 CEST4964953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.192173004 CEST53496491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.328758001 CEST4965053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.335659027 CEST53496501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.336143017 CEST4965153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.344050884 CEST53496511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.344405890 CEST4965253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.352216959 CEST53496521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.352453947 CEST4965353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.360641956 CEST53496531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.360893965 CEST4965453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.369548082 CEST53496541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.514327049 CEST4965553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.523714066 CEST53496551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.524396896 CEST4965653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.532888889 CEST53496561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.533463955 CEST4965753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.542349100 CEST53496571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.542707920 CEST4965853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.550981998 CEST53496581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.551309109 CEST4965953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.560986996 CEST53496591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.687737942 CEST4966053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.696178913 CEST53496601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.696623087 CEST4966153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.705538034 CEST53496611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.705985069 CEST4966253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.714451075 CEST53496621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.714747906 CEST4966353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.723473072 CEST53496631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.723707914 CEST4966453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.732516050 CEST53496641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.863768101 CEST4966553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.872438908 CEST53496651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.872967958 CEST4966653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.881489992 CEST53496661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.881984949 CEST4966753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.891948938 CEST53496671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.892237902 CEST4966853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.902328014 CEST53496681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:14.902596951 CEST4966953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:14.911604881 CEST53496691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.036210060 CEST4967053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.044116974 CEST53496701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.044456959 CEST4967153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.062622070 CEST53496711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.062978029 CEST4967253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.070594072 CEST53496721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.070831060 CEST4967353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.080388069 CEST53496731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.080668926 CEST4967453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.089385033 CEST53496741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.223469973 CEST4967553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.231134892 CEST53496751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.231631994 CEST4967653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.238966942 CEST53496761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.239331007 CEST4967753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.247267008 CEST53496771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.247443914 CEST4967853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.255589008 CEST53496781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.255748987 CEST4967953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.267139912 CEST53496791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.388710022 CEST4968053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.397620916 CEST53496801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.397950888 CEST4968153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.405746937 CEST53496811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.406003952 CEST4968253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.414021969 CEST53496821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.414227009 CEST4968353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.423716068 CEST53496831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.423976898 CEST4968453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.433161974 CEST53496841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.569109917 CEST4968553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.577647924 CEST53496851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.578000069 CEST4968653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.586170912 CEST53496861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.586422920 CEST4968753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.595730066 CEST53496871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.595954895 CEST4968853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.604044914 CEST53496881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.604288101 CEST4968953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.613384962 CEST53496891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.750823021 CEST4969053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.758441925 CEST53496901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.758796930 CEST4969153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.766711950 CEST53496911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.766993046 CEST4969253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.774918079 CEST53496921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.775161982 CEST4969353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.783857107 CEST53496931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.784104109 CEST4969453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.791768074 CEST53496941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.935420990 CEST4969553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.942548037 CEST53496951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.942866087 CEST4969653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.952008009 CEST53496961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.952229977 CEST4969753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.960643053 CEST53496971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.960858107 CEST4969853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.968811989 CEST53496981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:15.969028950 CEST4969953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:15.979340076 CEST53496991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.098658085 CEST4970053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.108411074 CEST53497001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.108781099 CEST4970153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.118721962 CEST53497011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.118938923 CEST4970253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.138514042 CEST53497021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.138724089 CEST4970353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.147506952 CEST53497031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.147691965 CEST4970453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.155951023 CEST53497041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.295953035 CEST4970553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.305548906 CEST53497051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.305901051 CEST4970653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.315732002 CEST53497061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.316052914 CEST4970753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.326005936 CEST53497071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.326231956 CEST4970853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.335525036 CEST53497081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.335726976 CEST4970953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.346502066 CEST53497091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.456187963 CEST4971053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.465732098 CEST53497101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.466247082 CEST4971153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.475931883 CEST53497111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.476130962 CEST4971253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.486651897 CEST53497121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.486846924 CEST4971353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.495739937 CEST53497131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.495990038 CEST4971453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.506211996 CEST53497141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.608340979 CEST6480453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.657994032 CEST53648041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.665155888 CEST6480553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.672173977 CEST53648051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.672499895 CEST6480653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.680825949 CEST53648061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.681005955 CEST6480753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.689639091 CEST53648071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.689809084 CEST6480853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.697593927 CEST53648081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.697774887 CEST6480953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.706274986 CEST53648091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.814450026 CEST6481053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.821348906 CEST53648101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.821850061 CEST6481153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.830755949 CEST53648111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.832273960 CEST6481253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.840527058 CEST53648121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.840889931 CEST6481353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.847985983 CEST53648131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.848282099 CEST6481453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.856379986 CEST53648141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.990309000 CEST6481553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:16.997385979 CEST53648151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:16.997769117 CEST6481653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.006081104 CEST53648161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.006331921 CEST6481753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.013842106 CEST53648171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.014069080 CEST6481853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.022838116 CEST53648181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.023123026 CEST6481953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.032011032 CEST53648191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.140441895 CEST6482053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.147530079 CEST53648201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.147876024 CEST6482153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.157478094 CEST53648211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.157860041 CEST6482253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.165889978 CEST53648221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.166168928 CEST6482353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.173815966 CEST53648231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.174010992 CEST6482453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.185079098 CEST53648241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.289791107 CEST6482553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.297225952 CEST53648251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.297771931 CEST6482653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.305598021 CEST53648261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.305821896 CEST6482753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.315438032 CEST53648271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.315722942 CEST6482853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.323348999 CEST53648281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.323590994 CEST6482953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.331494093 CEST53648291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.442117929 CEST6483053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.450798988 CEST53648301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.451819897 CEST6483153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.459429979 CEST53648311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.459676981 CEST6483253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.469007015 CEST53648321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.471803904 CEST6483353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.481389046 CEST53648331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.483716965 CEST6483453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.492947102 CEST53648341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.599618912 CEST6483553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.607110023 CEST53648351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.607816935 CEST6483653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.617027044 CEST53648361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.619856119 CEST6483753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.628341913 CEST53648371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.630287886 CEST6483853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.638206005 CEST53648381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.642152071 CEST6483953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.652472973 CEST53648391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.750847101 CEST6484053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.757889032 CEST53648401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.759752035 CEST6484153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.766988993 CEST53648411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.767832994 CEST6484253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.775901079 CEST53648421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.779715061 CEST6484353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.787255049 CEST53648431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.787638903 CEST6484453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.796238899 CEST53648441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.896836042 CEST6484553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.906738997 CEST53648451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.907124996 CEST6484653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.918931007 CEST53648461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.919296980 CEST6484753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.926841974 CEST53648471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.927098989 CEST6484853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.934638023 CEST53648481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:17.934849024 CEST6484953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:17.943346977 CEST53648491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.061173916 CEST6485053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.071921110 CEST53648501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.075815916 CEST6485153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.086064100 CEST53648511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.086318970 CEST6485253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.098849058 CEST53648521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.099080086 CEST6485353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.107156038 CEST53648531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.107393980 CEST6485453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.117928982 CEST53648541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.219819069 CEST6485553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.229660034 CEST53648551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.230377913 CEST6485653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.239845991 CEST53648561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.240053892 CEST6485753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.249584913 CEST53648571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.249803066 CEST6485853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.260401964 CEST53648581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.261305094 CEST6485953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.269575119 CEST53648591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.352790117 CEST5146853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.360522985 CEST53514681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.367508888 CEST5146953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.375947952 CEST53514691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.376389027 CEST5147053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.384716988 CEST53514701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.384967089 CEST5147153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.393047094 CEST53514711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.393248081 CEST5147253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.405092001 CEST53514721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.405304909 CEST5147353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.413289070 CEST53514731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.499649048 CEST5147453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.507323027 CEST53514741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.507788897 CEST5147553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.515693903 CEST53514751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.519735098 CEST5147653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.527097940 CEST53514761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.527645111 CEST5147753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.536106110 CEST53514771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.539716959 CEST5147853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.549726963 CEST53514781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.665218115 CEST5147953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.673032999 CEST53514791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.673825026 CEST5148053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.681556940 CEST53514801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.682952881 CEST5148153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.690542936 CEST53514811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.693751097 CEST5148253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.702301025 CEST53514821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.705862999 CEST5148353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.713385105 CEST53514831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.803215981 CEST5148453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.811127901 CEST53514841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.814410925 CEST5148553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.822592020 CEST53514851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.825855970 CEST5148653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.833914995 CEST53514861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.834167004 CEST5148753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.842125893 CEST53514871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.845849037 CEST5148853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.853877068 CEST53514881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.938508987 CEST5148953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.946283102 CEST53514891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.946727991 CEST5149053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.955601931 CEST53514901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.955889940 CEST5149153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.962677002 CEST53514911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.962933064 CEST5149253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.970623970 CEST53514921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:18.970844984 CEST5149353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:18.977720022 CEST53514931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.069094896 CEST5149453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.076970100 CEST53514941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.077276945 CEST5149553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.085342884 CEST53514951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.085544109 CEST5149653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.092950106 CEST53514961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.093147039 CEST5149753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.100321054 CEST53514971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.100512028 CEST5149853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.107572079 CEST53514981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.256824970 CEST5149953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.266485929 CEST53514991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.266815901 CEST5150053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.275909901 CEST53515001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.276176929 CEST5150153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.286777973 CEST53515011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.287026882 CEST5150253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.295888901 CEST53515021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.296194077 CEST5150353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.304775953 CEST53515031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.389691114 CEST5150453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.396684885 CEST53515041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.396959066 CEST5150553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.404866934 CEST53515051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.405106068 CEST5150653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.412969112 CEST53515061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.413130999 CEST5150753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.425950050 CEST53515071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.426212072 CEST5150853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.442455053 CEST53515081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.529942036 CEST5150953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.539674044 CEST53515091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.540137053 CEST5151053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.548657894 CEST53515101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.548958063 CEST5151153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.566015005 CEST53515111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.566267014 CEST5151253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.575136900 CEST53515121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.575340986 CEST5151353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.583798885 CEST53515131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.685106039 CEST5151453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.692284107 CEST53515141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.693232059 CEST5151553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.699870110 CEST53515151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.700159073 CEST5151653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.708576918 CEST53515161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.708789110 CEST5151753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.715810061 CEST53515171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.716077089 CEST5151853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.724035978 CEST53515181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.810848951 CEST5151953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.818192959 CEST53515191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.818497896 CEST5152053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.827080011 CEST53515201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.827306986 CEST5152153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.839658022 CEST53515211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.839890957 CEST5152253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.848869085 CEST53515221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.849103928 CEST5152353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.856901884 CEST53515231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.944806099 CEST5152453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.952115059 CEST53515241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.952461004 CEST5152553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.960709095 CEST53515251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.960944891 CEST5152653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.968795061 CEST53515261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.969017982 CEST5152753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.977653980 CEST53515271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:19.977878094 CEST5152853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:19.985336065 CEST53515281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.076530933 CEST5152953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.083803892 CEST53515291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.084148884 CEST5153053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.092164040 CEST53515301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.092400074 CEST5153153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.100063086 CEST53515311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.100281000 CEST5153253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.108757973 CEST53515321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.108975887 CEST5153353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.116709948 CEST53515331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.201978922 CEST5153453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.209804058 CEST53515341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.210215092 CEST5153553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.218614101 CEST53515351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.218910933 CEST5153653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.227822065 CEST53515361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.228087902 CEST5153753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.235903978 CEST53515371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.236124992 CEST5153853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.243860960 CEST53515381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.326822042 CEST5153953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.336643934 CEST53515391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.337146044 CEST5154053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.347410917 CEST53515401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.347827911 CEST5154153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.359872103 CEST53515411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.362550020 CEST5154253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.371260881 CEST53515421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.373788118 CEST5154353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.381227970 CEST53515431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.474386930 CEST5154453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.484292030 CEST53515441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.484627962 CEST5154553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.493016005 CEST53515451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.493191004 CEST5154653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.501631975 CEST53515461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.501936913 CEST5154753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.511221886 CEST53515471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.511478901 CEST5154853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.520860910 CEST53515481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.593770027 CEST5154953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.608961105 CEST53515491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.609349012 CEST5155053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.618153095 CEST53515501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.618334055 CEST5155153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.627038002 CEST53515511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.627223015 CEST5155253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.636878967 CEST53515521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.637089014 CEST5155353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.646514893 CEST53515531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.723854065 CEST5155453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.731904984 CEST53515541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.732225895 CEST5155553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.742326975 CEST53515551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.742635012 CEST5155653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.753098965 CEST53515561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.753329992 CEST5155753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.766549110 CEST53515571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.766792059 CEST5155853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.775505066 CEST53515581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.858139038 CEST5155953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.867520094 CEST53515591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.868092060 CEST5156053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.879122019 CEST53515601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.879621029 CEST5156153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.888818026 CEST53515611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.889116049 CEST5156253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.898636103 CEST53515621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.898900986 CEST5156353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:20.908092976 CEST53515631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:20.990763903 CEST5156453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.000571966 CEST53515641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.000905991 CEST5156553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.011467934 CEST53515651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.011919975 CEST5156653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.020350933 CEST53515661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.020648956 CEST5156753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.032634020 CEST53515671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.033066034 CEST5156853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.042469025 CEST53515681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.132006884 CEST5156953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.139127016 CEST53515691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.139494896 CEST5157053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.148214102 CEST53515701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.148456097 CEST5157153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.155934095 CEST53515711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.156131983 CEST5157253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.165126085 CEST53515721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.165307045 CEST5157353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.173832893 CEST53515731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.242960930 CEST6107353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.408685923 CEST53610731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.415829897 CEST6107453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.423535109 CEST53610741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.423974037 CEST6107553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.432442904 CEST53610751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.432764053 CEST6107653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.441478968 CEST53610761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.441778898 CEST6107753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.451785088 CEST53610771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.451987982 CEST6107853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.461518049 CEST53610781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.528142929 CEST6107953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.535753965 CEST53610791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.536118984 CEST6108053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.545193911 CEST53610801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.545629978 CEST6108153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.554769993 CEST53610811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.554975033 CEST6108253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.562508106 CEST53610821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.562781096 CEST6108353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.570096970 CEST53610831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.644725084 CEST6108453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.651762009 CEST53610841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.652089119 CEST6108553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.660533905 CEST53610851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.660788059 CEST6108653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.668131113 CEST53610861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.668342113 CEST6108753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.676233053 CEST53610871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.676415920 CEST6108853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.687393904 CEST53610881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.774460077 CEST6108953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.782520056 CEST53610891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.782922983 CEST6109053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.793200016 CEST53610901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.793493986 CEST6109153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.802947044 CEST53610911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.803335905 CEST6109253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.811206102 CEST53610921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.811518908 CEST6109353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.819394112 CEST53610931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.889404058 CEST6109453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.896935940 CEST53610941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.897496939 CEST6109553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.906059027 CEST53610951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.906317949 CEST6109653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.915522099 CEST53610961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.915739059 CEST6109753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.925770044 CEST53610971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:21.926088095 CEST6109853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:21.936922073 CEST53610981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.019726992 CEST6109953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.030699968 CEST53610991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.031089067 CEST6110053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.042943001 CEST53611001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.043354034 CEST6110153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.052095890 CEST53611011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.052349091 CEST6110253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.062891960 CEST53611021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.063146114 CEST6110353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.075294018 CEST53611031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.165985107 CEST6110453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.173202991 CEST53611041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.173746109 CEST6110553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.180855989 CEST53611051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.181129932 CEST6110653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.189038992 CEST53611061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.189280987 CEST6110753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.197493076 CEST53611071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.199469090 CEST6110853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.208173990 CEST53611081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.281749010 CEST6110953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.289108992 CEST53611091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.289494038 CEST6111053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.300419092 CEST53611101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.300738096 CEST6111153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.310370922 CEST53611111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.310612917 CEST6111253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.320038080 CEST53611121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.320255041 CEST6111353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.329185963 CEST53611131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.405572891 CEST6111453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.414979935 CEST53611141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.418006897 CEST6111553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.426980019 CEST53611151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.427309990 CEST6111653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.435194969 CEST53611161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.435516119 CEST6111753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.443221092 CEST53611171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.443414927 CEST6111853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.451905012 CEST53611181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.530405045 CEST6111953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.542753935 CEST53611191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.543128967 CEST6112053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.551475048 CEST53611201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.551671982 CEST6112153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.562202930 CEST53611211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.562386990 CEST6112253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.572424889 CEST53611221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.572613001 CEST6112353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.580672979 CEST53611231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.655781984 CEST6112453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.662733078 CEST53611241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.663220882 CEST6112553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.672349930 CEST53611251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.672732115 CEST6112653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.680294991 CEST53611261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.680521965 CEST6112753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.687558889 CEST53611271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.687757969 CEST6112853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.697953939 CEST53611281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.773387909 CEST6112953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.780927896 CEST53611291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.781311989 CEST6113053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.797408104 CEST53611301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.799719095 CEST6113153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.808677912 CEST53611311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.808940887 CEST6113253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.817226887 CEST53611321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.819071054 CEST6113353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.826427937 CEST53611331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.891402006 CEST6113453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.899137020 CEST53611341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.899593115 CEST6113553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.907460928 CEST53611351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.907787085 CEST6113653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.915644884 CEST53611361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.915863991 CEST6113753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.923176050 CEST53611371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:22.923485041 CEST6113853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:22.932420015 CEST53611381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.004084110 CEST6113953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.013648987 CEST53611391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.014113903 CEST6114053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.023557901 CEST53611401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.023828983 CEST6114153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.033741951 CEST53611411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.034073114 CEST6114253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.045028925 CEST53611421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.045300007 CEST6114353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.054693937 CEST53611431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.142092943 CEST6114453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.150324106 CEST53611441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.150682926 CEST6114553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.159877062 CEST53611451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.160115957 CEST6114653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.175225019 CEST53611461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.175493956 CEST6114753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.186479092 CEST53611471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.186741114 CEST6114853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.196043015 CEST53611481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.259159088 CEST5136253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.306926966 CEST53513621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.316736937 CEST5136353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.323904991 CEST53513631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.324340105 CEST5136453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.331924915 CEST53513641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.334311962 CEST5136553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.342660904 CEST53513651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.346081972 CEST5136653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.353099108 CEST53513661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.353877068 CEST5136753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.362307072 CEST53513671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.447690964 CEST5136853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.454993010 CEST53513681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.456783056 CEST5136953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.466114044 CEST53513691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.474833012 CEST5137053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.482865095 CEST53513701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.486680984 CEST5137153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.493825912 CEST53513711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.495486975 CEST5137253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.503556013 CEST53513721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.577445030 CEST5137353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.584703922 CEST53513731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.587462902 CEST5137453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.595645905 CEST53513741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.598654985 CEST5137553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.606197119 CEST53513751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.611747980 CEST5137653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.619887114 CEST53513761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.623745918 CEST5137753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.630852938 CEST53513771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.708271980 CEST5137853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.715823889 CEST53513781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.716255903 CEST5137953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.724251032 CEST53513791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.726113081 CEST5138053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.733787060 CEST53513801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.738092899 CEST5138153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.745542049 CEST53513811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.749955893 CEST5138253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.759488106 CEST53513821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.838881016 CEST5138353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.846009016 CEST53513831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.847830057 CEST5138453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.856679916 CEST53513841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.859638929 CEST5138553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.869051933 CEST53513851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.869292974 CEST5138653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.877156973 CEST53513861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.877362013 CEST5138753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.887227058 CEST53513871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.955902100 CEST5138853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.962954998 CEST53513881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.963295937 CEST5138953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.971584082 CEST53513891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.971828938 CEST5139053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.979357004 CEST53513901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.979665995 CEST5139153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.989790916 CEST53513911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:23.990128994 CEST5139253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:23.997736931 CEST53513921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.074960947 CEST5139353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.082483053 CEST53513931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.082885981 CEST5139453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.090959072 CEST53513941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.091265917 CEST5139553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.098752975 CEST53513951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.098993063 CEST5139653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.106452942 CEST53513961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.106744051 CEST5139753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.114494085 CEST53513971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.198837996 CEST5139853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.205651045 CEST53513981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.206098080 CEST5139953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.213736057 CEST53513991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.214124918 CEST5140053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.221571922 CEST53514001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.221869946 CEST5140153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.229867935 CEST53514011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.230109930 CEST5140253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.239270926 CEST53514021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.318211079 CEST5140353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.325120926 CEST53514031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.325473070 CEST5140453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.333014965 CEST53514041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.333246946 CEST5140553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.340692043 CEST53514051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.340939999 CEST5140653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.348875046 CEST53514061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.349193096 CEST5140753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.356261015 CEST53514071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.420697927 CEST5140853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.429052114 CEST53514081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.432029009 CEST5140953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.440329075 CEST53514091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.443820000 CEST5141053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.451561928 CEST53514101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.454529047 CEST5141153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.462796926 CEST53514111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.463157892 CEST5141253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.472714901 CEST53514121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.545547962 CEST5141353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.553900957 CEST53514131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.554274082 CEST5141453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.561463118 CEST53514141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.561692953 CEST5141553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.573175907 CEST53514151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.573565006 CEST5141653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.580466986 CEST53514161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.580724955 CEST5141753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.590636015 CEST53514171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.664541960 CEST5141853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.671652079 CEST53514181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.673892975 CEST5141953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.682769060 CEST53514191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.685786963 CEST5142053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.693958998 CEST53514201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.694658995 CEST5142153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.703079939 CEST53514211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.707817078 CEST5142253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.717847109 CEST53514221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.784770012 CEST5142353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.793633938 CEST53514231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.798372984 CEST5142453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.807173967 CEST53514241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.807940006 CEST5142553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.816781044 CEST53514251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.819817066 CEST5142653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.829797983 CEST53514261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.831866026 CEST5142753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.840212107 CEST53514271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.905538082 CEST5142853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.912286043 CEST53514281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.915663958 CEST5142953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.923187017 CEST53514291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.923408031 CEST5143053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.931143999 CEST53514301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.931377888 CEST5143153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.940905094 CEST53514311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:24.941139936 CEST5143253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:24.949662924 CEST53514321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.019591093 CEST5143353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.028683901 CEST53514331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.029047966 CEST5143453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.038009882 CEST53514341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.038347960 CEST5143553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.046366930 CEST53514351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.046734095 CEST5143653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.054646015 CEST53514361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.055272102 CEST5143753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.064013004 CEST53514371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.153480053 CEST5143853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.166217089 CEST53514381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.166920900 CEST5143953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.179598093 CEST53514391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.181390047 CEST5144053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.193520069 CEST53514401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.193900108 CEST5144153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.202208996 CEST53514411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.202522039 CEST5144253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.211699009 CEST53514421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.295999050 CEST5144353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.305960894 CEST53514431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.306334019 CEST5144453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.315910101 CEST53514441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.316245079 CEST5144553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.326961994 CEST53514451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.327341080 CEST5144653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.338021994 CEST53514461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.338327885 CEST5144753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.348546982 CEST53514471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.428642988 CEST5144853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.437052011 CEST53514481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.437979937 CEST5144953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.448698997 CEST53514491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.449702024 CEST5145053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.458723068 CEST53514501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.461749077 CEST5145153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.470807076 CEST53514511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.473854065 CEST5145253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.486057043 CEST53514521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.895756006 CEST5145353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.903223038 CEST53514531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.907969952 CEST5145453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.916834116 CEST53514541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.918548107 CEST5145553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.926867962 CEST53514551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.927293062 CEST5145653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.936692953 CEST53514561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:25.939313889 CEST5145753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:25.947643995 CEST53514571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.066992998 CEST5145853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.074664116 CEST53514581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.075054884 CEST5145953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.082412004 CEST53514591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.083028078 CEST5146053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.093909025 CEST53514601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.094221115 CEST5146153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.102248907 CEST53514611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.102596045 CEST5146253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.111548901 CEST53514621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.189273119 CEST5146353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.198554039 CEST53514631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.199438095 CEST5146453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.207195044 CEST53514641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.208554983 CEST5146553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.216051102 CEST53514651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.216814041 CEST5146653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.224267960 CEST53514661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.227747917 CEST5146753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.237102032 CEST53514671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.295500994 CEST5648753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.551830053 CEST53564871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.560513020 CEST5648853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.569169044 CEST53564881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.569796085 CEST5648953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.577341080 CEST53564891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.577836037 CEST5649053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.586193085 CEST53564901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.586421013 CEST5649153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.595104933 CEST53564911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.595462084 CEST5649253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.602533102 CEST53564921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.678802967 CEST5649353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.686065912 CEST53564931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.686451912 CEST5649453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.693726063 CEST53564941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.694022894 CEST5649553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.702332020 CEST53564951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.702610970 CEST5649653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.710714102 CEST53564961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.710947037 CEST5649753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.718909979 CEST53564971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.782349110 CEST5649853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.789563894 CEST53564981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.790056944 CEST5649953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.797430038 CEST53564991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.797714949 CEST5650053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.805255890 CEST53565001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.805569887 CEST5650153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.812865973 CEST53565011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.813155890 CEST5650253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.821238995 CEST53565021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.896861076 CEST5650353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.904174089 CEST53565031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.904794931 CEST5650453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.914350033 CEST53565041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.914958954 CEST5650553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.925060034 CEST53565051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.925398111 CEST5650653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.933144093 CEST53565061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:26.933362007 CEST5650753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:26.943727016 CEST53565071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.005386114 CEST5650853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.012243986 CEST53565081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.012712955 CEST5650953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.020347118 CEST53565091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.020703077 CEST5651053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.028836966 CEST53565101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.029191971 CEST5651153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.037302017 CEST53565111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.037587881 CEST5651253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.044933081 CEST53565121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.115876913 CEST5651353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.125072002 CEST53565131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.125483990 CEST5651453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.134028912 CEST53565141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.134308100 CEST5651553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.148889065 CEST53565151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.149194002 CEST5651653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.159545898 CEST53565161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.159982920 CEST5651753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.169934034 CEST53565171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.266616106 CEST5651853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.275336027 CEST53565181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.275876999 CEST5651953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.285757065 CEST53565191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.286081076 CEST5652053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.296511889 CEST53565201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.298571110 CEST5652153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.310112000 CEST53565211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.310497999 CEST5652253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.322292089 CEST53565221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.394856930 CEST5652353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.404603004 CEST53565231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.406682014 CEST5652453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.417272091 CEST53565241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.419925928 CEST5652553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.433387041 CEST53565251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.435849905 CEST5652653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.446165085 CEST53565261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.447860003 CEST5652753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.460994005 CEST53565271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.536215067 CEST5652853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.545825958 CEST53565281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.546941042 CEST5652953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.554878950 CEST53565291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.557959080 CEST5653053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.567177057 CEST53565301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.569905043 CEST5653153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.577491999 CEST53565311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.581995010 CEST5653253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.589917898 CEST53565321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.654259920 CEST5653353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.663047075 CEST53565331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.666032076 CEST5653453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.673283100 CEST53565341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.673835039 CEST5653553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.682198048 CEST53565351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.685908079 CEST5653653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.694736004 CEST53565361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.697813034 CEST5653753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.706492901 CEST53565371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.767122984 CEST5653853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.774179935 CEST53565381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.774606943 CEST5653953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.782682896 CEST53565391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.783044100 CEST5654053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.791491032 CEST53565401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.791786909 CEST5654153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.800935030 CEST53565411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.801209927 CEST5654253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.809792042 CEST53565421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.882160902 CEST5654353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.890777111 CEST53565431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.891182899 CEST5654453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.901025057 CEST53565441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.901417017 CEST5654553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.910283089 CEST53565451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.911789894 CEST5654653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.919501066 CEST53565461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:27.926637888 CEST5654753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:27.938184977 CEST53565471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.006213903 CEST5654853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.014054060 CEST53565481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.014487982 CEST5654953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.022352934 CEST53565491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.022802114 CEST5655053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.030643940 CEST53565501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.030967951 CEST5655153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.038995028 CEST53565511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.039505005 CEST5655253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.049151897 CEST53565521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.148926020 CEST5655353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.157773972 CEST53565531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.158294916 CEST5655453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.166850090 CEST53565541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.167464018 CEST5655553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.176384926 CEST53565551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.176856041 CEST5655653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.185295105 CEST53565561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.185575008 CEST5655753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.193043947 CEST53565571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.692295074 CEST6463653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.778930902 CEST53646361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.786263943 CEST6463753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.796533108 CEST53646371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.796952963 CEST6463853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.804868937 CEST53646381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.805105925 CEST6463953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.812464952 CEST53646391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.812726021 CEST6464053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.820385933 CEST53646401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.820663929 CEST6464153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.828438997 CEST53646411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.892810106 CEST6464253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.900619030 CEST53646421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.901189089 CEST6464353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.911845922 CEST53646431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.912183046 CEST6464453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.920063972 CEST53646441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.920444012 CEST6464553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.929557085 CEST53646451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:28.929804087 CEST6464653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:28.938888073 CEST53646461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.015511990 CEST6464753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.023122072 CEST53646471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.023504019 CEST6464853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.037544012 CEST53646481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.037847996 CEST6464953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.050307989 CEST53646491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.050595999 CEST6465053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.063668966 CEST53646501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.063945055 CEST6465153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.077683926 CEST53646511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.148065090 CEST6465253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.160187006 CEST53646521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.160959005 CEST6465353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.174285889 CEST53646531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.174638033 CEST6465453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.187670946 CEST53646541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.188055038 CEST6465553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.202558041 CEST53646551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.202888012 CEST6465653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.214927912 CEST53646561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.286180019 CEST6465753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.297205925 CEST53646571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.297715902 CEST6465853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.308290958 CEST53646581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.308706045 CEST6465953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.320486069 CEST53646591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.320909023 CEST6466053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.330476046 CEST53646601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.330872059 CEST6466153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.338264942 CEST53646611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.406259060 CEST6466253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.413707018 CEST53646621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.414114952 CEST6466353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.422823906 CEST53646631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.423193932 CEST6466453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.430613995 CEST53646641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.430857897 CEST6466553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.442034006 CEST53646651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.442291975 CEST6466653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.450009108 CEST53646661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.517519951 CEST6466753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.527586937 CEST53646671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.527976990 CEST6466853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.536094904 CEST53646681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.536317110 CEST6466953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.546920061 CEST53646691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.547143936 CEST6467053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.557996035 CEST53646701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.558195114 CEST6467153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.568145037 CEST53646711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.626286983 CEST6467253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.635688066 CEST53646721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.636643887 CEST6467353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.646612883 CEST53646731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.646991968 CEST6467453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.656786919 CEST53646741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.661781073 CEST6467553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.672234058 CEST53646751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.672530890 CEST6467653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.683408976 CEST53646761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.749768019 CEST6467753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.757189035 CEST53646771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.757608891 CEST6467853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.765692949 CEST53646781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.766024113 CEST6467953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.774312973 CEST53646791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.774542093 CEST6468053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.782407045 CEST53646801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.782668114 CEST6468153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.791635036 CEST53646811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.864635944 CEST6468253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.871783972 CEST53646821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.872108936 CEST6468353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.880956888 CEST53646831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.881211996 CEST6468453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.890135050 CEST53646841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.890376091 CEST6468553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.898454905 CEST53646851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.898714066 CEST6468653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.906219959 CEST53646861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.966485023 CEST6468753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.973234892 CEST53646871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.973573923 CEST6468853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.981494904 CEST53646881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.981811047 CEST6468953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:29.991095066 CEST53646891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:29.991472006 CEST6469053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.000538111 CEST53646901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.000817060 CEST6469153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.010402918 CEST53646911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.080625057 CEST6469253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.090164900 CEST53646921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.090534925 CEST6469353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.099196911 CEST53646931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.099473000 CEST6469453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.107981920 CEST53646941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.108210087 CEST6469553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.117938042 CEST53646951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.118153095 CEST6469653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.126991987 CEST53646961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.190740108 CEST6469753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.201138973 CEST53646971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.201576948 CEST6469853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.211292982 CEST53646981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.211524963 CEST6469953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.221343040 CEST53646991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.221663952 CEST6470053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.229899883 CEST53647001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.230245113 CEST6470153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.237246037 CEST53647011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.300880909 CEST6470253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.308012962 CEST53647021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.308732033 CEST6470353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.317678928 CEST53647031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.317985058 CEST6470453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.325211048 CEST53647041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.325630903 CEST6470553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.333520889 CEST53647051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.333988905 CEST6470653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.342778921 CEST53647061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.406985044 CEST6470753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.414135933 CEST53647071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.415807009 CEST6470853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.423485994 CEST53647081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.423983097 CEST6470953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.432743073 CEST53647091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.432986975 CEST6471053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.441582918 CEST53647101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.441986084 CEST6471153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.449856043 CEST53647111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.516066074 CEST6471253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.523122072 CEST53647121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.523572922 CEST6471353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.531500101 CEST53647131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.531747103 CEST6471453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.539347887 CEST53647141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.539632082 CEST6471553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.547771931 CEST53647151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.548034906 CEST6471653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.556744099 CEST53647161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.624397993 CEST6471753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.631613016 CEST53647171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.632239103 CEST6471853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.639353037 CEST53647181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.639625072 CEST6471953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.647301912 CEST53647191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.647492886 CEST6472053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.654995918 CEST53647201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.655730963 CEST6472153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.662990093 CEST53647211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.732279062 CEST6472253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.739875078 CEST53647221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.743774891 CEST6472353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.751331091 CEST53647231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.751717091 CEST6472453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.763676882 CEST53647241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.767932892 CEST6472553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.778188944 CEST53647251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.779710054 CEST6472653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.787709951 CEST53647261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.856839895 CEST6472753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.866767883 CEST53647271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.870269060 CEST6472853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.878844976 CEST53647281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.882030964 CEST6472953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.892421961 CEST53647291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.893951893 CEST6473053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.905775070 CEST53647301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.906267881 CEST6473153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:30.918101072 CEST53647311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:30.989451885 CEST6473253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.001034021 CEST53647321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.001528978 CEST6473353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.010885954 CEST53647331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.011406898 CEST6473453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.021042109 CEST53647341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.021615982 CEST6473553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.030828953 CEST53647351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.031152010 CEST6473653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.040769100 CEST53647361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.116897106 CEST6473753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.126297951 CEST53647371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.126677990 CEST6473853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.134754896 CEST53647381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.135077000 CEST6473953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.150654078 CEST53647391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.150976896 CEST6474053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.163921118 CEST53647401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.164237022 CEST6474153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.177027941 CEST53647411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.240391016 CEST6474253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.252540112 CEST53647421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.252990007 CEST6474353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.264750957 CEST53647431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.265094995 CEST6474453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.277678013 CEST53647441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.278028011 CEST6474553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.291789055 CEST53647451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.292263985 CEST6474653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.300276041 CEST53647461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.374367952 CEST5079553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.529920101 CEST53507951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.541033983 CEST5079653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.547977924 CEST53507961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.548439980 CEST5079753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.556984901 CEST53507971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.557205915 CEST5079853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.566562891 CEST53507981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.566998959 CEST5079953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.576179981 CEST53507991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.576548100 CEST5080053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.584379911 CEST53508001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.658420086 CEST5080153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.669508934 CEST53508011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.670011997 CEST5080253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.678162098 CEST53508021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.678498030 CEST5080353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.687035084 CEST53508031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.689857960 CEST5080453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.696943045 CEST53508041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.697746038 CEST5080553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.706300974 CEST53508051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.767637014 CEST5080653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.774578094 CEST53508061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.774971962 CEST5080753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.786483049 CEST53508071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.786910057 CEST5080853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.794728994 CEST53508081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.795018911 CEST5080953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.805104971 CEST53508091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.805403948 CEST5081053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.813803911 CEST53508101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.875859022 CEST5081153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.883413076 CEST53508111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.883951902 CEST5081253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.893064022 CEST53508121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.894254923 CEST5081353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.904542923 CEST53508131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.907433987 CEST5081453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.916198015 CEST53508141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.916532040 CEST5081553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.924680948 CEST53508151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.988775969 CEST5081653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:31.996522903 CEST53508161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:31.997036934 CEST5081753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.006738901 CEST53508171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.006978035 CEST5081853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.014565945 CEST53508181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.014852047 CEST5081953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.021883965 CEST53508191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.022099972 CEST5082053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.033220053 CEST53508201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.107752085 CEST5082153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.115063906 CEST53508211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.115392923 CEST5082253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.124058962 CEST53508221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.124295950 CEST5082353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.131721020 CEST53508231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.131941080 CEST5082453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.139031887 CEST53508241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.139220953 CEST5082553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.146259069 CEST53508251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.208894968 CEST5082653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.216195107 CEST53508261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.216552019 CEST5082753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.224592924 CEST53508271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.224858999 CEST5082853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.236722946 CEST53508281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.237024069 CEST5082953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.245832920 CEST53508291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.246507883 CEST5083053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.255624056 CEST53508301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.317812920 CEST5083153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.326643944 CEST53508311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.327003956 CEST5083253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.338900089 CEST53508321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.339376926 CEST5083353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.348618031 CEST53508331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.348929882 CEST5083453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.358535051 CEST53508341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.358830929 CEST5083553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.368628025 CEST53508351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.430489063 CEST5083653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.437671900 CEST53508361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.438200951 CEST5083753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.445197105 CEST53508371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.445425034 CEST5083853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.452842951 CEST53508381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.453082085 CEST5083953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.460465908 CEST53508391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.460690022 CEST5084053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.469785929 CEST53508401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.532469034 CEST5084153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.539745092 CEST53508411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.540190935 CEST5084253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.547583103 CEST53508421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.547976971 CEST5084353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.555670977 CEST53508431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.556123972 CEST5084453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.564285040 CEST53508441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.564542055 CEST5084553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.571994066 CEST53508451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.645390034 CEST5084653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.652791977 CEST53508461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.653964043 CEST5084753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.662101030 CEST53508471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.664514065 CEST5084853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.672750950 CEST53508481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.672960997 CEST5084953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.681598902 CEST53508491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.681762934 CEST5085053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.690849066 CEST53508501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.769604921 CEST5085153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.777612925 CEST53508511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.778487921 CEST5085253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.785912991 CEST53508521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.789556026 CEST5085353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.797439098 CEST53508531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.797719955 CEST5085453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.806994915 CEST53508541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.809066057 CEST5085553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.817009926 CEST53508551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.889908075 CEST5085653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.899808884 CEST53508561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.900340080 CEST5085753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.908869028 CEST53508571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.909122944 CEST5085853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.919466019 CEST53508581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.919969082 CEST5085953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.929222107 CEST53508591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:32.929639101 CEST5086053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:32.939675093 CEST53508601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.001614094 CEST5086153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.010929108 CEST53508611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.011523008 CEST5086253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.018740892 CEST53508621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.019113064 CEST5086353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.027683973 CEST53508631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.028060913 CEST5086453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.036915064 CEST53508641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.037377119 CEST5086553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.045066118 CEST53508651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.140476942 CEST5086653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.148422003 CEST53508661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.148883104 CEST5086753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.156493902 CEST53508671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.157022953 CEST5086853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.164593935 CEST53508681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.164856911 CEST5086953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.172529936 CEST53508691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.172780991 CEST5087053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.180901051 CEST53508701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.244983912 CEST5081253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.252309084 CEST53508121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.260756016 CEST5081353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.268488884 CEST53508131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.269011021 CEST5081453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.275973082 CEST53508141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.276320934 CEST5081553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.284245014 CEST53508151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.284584045 CEST5081653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.291821003 CEST53508161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.292124987 CEST5081753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.300251007 CEST53508171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.372477055 CEST5081853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.379554987 CEST53508181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.379991055 CEST5081953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.387135983 CEST53508191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.387749910 CEST5082053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.395814896 CEST53508201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.396116018 CEST5082153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.403362989 CEST53508211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.405880928 CEST5082253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.413696051 CEST53508221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.484760046 CEST5082353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.492125034 CEST53508231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.493773937 CEST5082453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.501007080 CEST53508241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.501765013 CEST5082553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.509536028 CEST53508251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.510162115 CEST5082653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.518354893 CEST53508261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.519747019 CEST5082753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.528088093 CEST53508271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.617610931 CEST5082853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.625416994 CEST53508281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.627911091 CEST5082953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.638463974 CEST53508291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.639884949 CEST5083053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.647515059 CEST53508301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.651992083 CEST5083153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.659394026 CEST53508311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.663758993 CEST5083253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.671494007 CEST53508321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.739226103 CEST5083353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.746339083 CEST53508331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.746695995 CEST5083453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.754432917 CEST53508341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.759952068 CEST5083553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.768201113 CEST53508351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.771955967 CEST5083653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.780502081 CEST53508361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.783854961 CEST5083753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.794429064 CEST53508371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.867315054 CEST5083853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.874183893 CEST53508381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.879903078 CEST5083953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.887774944 CEST53508391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.891794920 CEST5084053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.899051905 CEST53508401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.903793097 CEST5084153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.917238951 CEST53508411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.918879986 CEST5084253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.926573038 CEST53508421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.983694077 CEST5084353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:33.990896940 CEST53508431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:33.994014978 CEST5084453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.000785112 CEST53508441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.001765966 CEST5084553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.008784056 CEST53508451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.009080887 CEST5084653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.016338110 CEST53508461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.016702890 CEST5084753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.023734093 CEST53508471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.094351053 CEST5084853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.104237080 CEST53508481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.104944944 CEST5084953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.114860058 CEST53508491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.115241051 CEST5085053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.123827934 CEST53508501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.124181032 CEST5085153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.132324934 CEST53508511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.132667065 CEST5085253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.144345045 CEST53508521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.207499027 CEST5085353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.214339018 CEST53508531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.214683056 CEST5085453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.221375942 CEST53508541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.221617937 CEST5085553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.229036093 CEST53508551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.229281902 CEST5085653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.239546061 CEST53508561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.239806890 CEST5085753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.248090982 CEST53508571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.317219019 CEST5085853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.325203896 CEST53508581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.325699091 CEST5085953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.333142042 CEST53508591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.333477020 CEST5086053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.340424061 CEST53508601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.340709925 CEST5086153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.349143982 CEST53508611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.349421978 CEST5086253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.358011007 CEST53508621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.426831007 CEST5086353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.434053898 CEST53508631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.434967995 CEST5086453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.443187952 CEST53508641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.443851948 CEST5086553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.452737093 CEST53508651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.457859993 CEST5086653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.467582941 CEST53508661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.467988968 CEST5086753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.476982117 CEST53508671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.531224012 CEST5086853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.541491985 CEST53508681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.541873932 CEST5086953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.552112103 CEST53508691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.552462101 CEST5087053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.562926054 CEST53508701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.563177109 CEST5087153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.573788881 CEST53508711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.574004889 CEST5087253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.581140041 CEST53508721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.633146048 CEST5087353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.640430927 CEST53508731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.641904116 CEST5087453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.649382114 CEST53508741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.650842905 CEST5087553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.659104109 CEST53508751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.659531116 CEST5087653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.666316032 CEST53508761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.666691065 CEST5087753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.674671888 CEST53508771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.739327908 CEST5087853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.746860027 CEST53508781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.747817039 CEST5087953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.756526947 CEST53508791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.756802082 CEST5088053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.764918089 CEST53508801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.765276909 CEST5088153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.773303032 CEST53508811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.773509979 CEST5088253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.781006098 CEST53508821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.862598896 CEST5088353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.869678974 CEST53508831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.872503042 CEST5088453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.881424904 CEST53508841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.881774902 CEST5088553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.889520884 CEST53508851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.889779091 CEST5088653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.897368908 CEST53508861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.899746895 CEST5088753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.907139063 CEST53508871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.966516972 CEST5088853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.973567963 CEST53508881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.975003004 CEST5088953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.982652903 CEST53508891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.983732939 CEST5089053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:34.991461039 CEST53508901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:34.995826006 CEST5089153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.004189968 CEST53508911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.007850885 CEST5089253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.016786098 CEST53508921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.289503098 CEST5089353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.298579931 CEST53508931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.301520109 CEST5089453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.310157061 CEST53508941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.313462019 CEST5089553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.321177006 CEST53508951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.329171896 CEST5089653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.336376905 CEST53508961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.336956024 CEST5089753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.344886065 CEST53508971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.610960007 CEST5089853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.618331909 CEST53508981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.618705988 CEST5089953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.626156092 CEST53508991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.626434088 CEST5090053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.633904934 CEST53509001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.634171963 CEST5090153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.644077063 CEST53509011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.644336939 CEST5090253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.652584076 CEST53509021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.712290049 CEST5090353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.719420910 CEST53509031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.719974995 CEST5090453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.727174044 CEST53509041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.727477074 CEST5090553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.735375881 CEST53509051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.735657930 CEST5090653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.743869066 CEST53509061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.744167089 CEST5090753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.752341032 CEST53509071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.811341047 CEST5090853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.818923950 CEST53509081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.819832087 CEST5090953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.827558994 CEST53509091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.828300953 CEST5091053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.836960077 CEST53509101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.837377071 CEST5091153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.845675945 CEST53509111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.849930048 CEST5091253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.857367039 CEST53509121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.919939041 CEST5091353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.927573919 CEST53509131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.930026054 CEST5091453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.937342882 CEST53509141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.937822104 CEST5091553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.945893049 CEST53509151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.948544025 CEST5091653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.956505060 CEST53509161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:35.958108902 CEST5091753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:35.965960026 CEST53509171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.021636963 CEST5091853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.028527975 CEST53509181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.028947115 CEST5091953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.036135912 CEST53509191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.036412954 CEST5092053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.046184063 CEST53509201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.046508074 CEST5092153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.055299997 CEST53509211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.055635929 CEST5092253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.064059973 CEST53509221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.120145082 CEST5092353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.127022028 CEST53509231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.127389908 CEST5092453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.134825945 CEST53509241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.135117054 CEST5092553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.144399881 CEST53509251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.144685030 CEST5092653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.152657032 CEST53509261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.152935028 CEST5092753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.161041975 CEST53509271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.249458075 CEST5092853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.257117987 CEST53509281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.257582903 CEST5092953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.267427921 CEST53509291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.267801046 CEST5093053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.280574083 CEST53509301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.280915022 CEST5093153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.289102077 CEST53509311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.289426088 CEST5093253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.297250032 CEST53509321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.352251053 CEST5093353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.359870911 CEST53509331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.360285044 CEST5093453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.368628025 CEST53509341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.368896008 CEST5093553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.376075983 CEST53509351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.376559019 CEST5093653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.384187937 CEST53509361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.384808064 CEST5093753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.393696070 CEST53509371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.443574905 CEST6500053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.493020058 CEST53650001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.503370047 CEST6500153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.510965109 CEST53650011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.512054920 CEST6500253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.519740105 CEST53650021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.521706104 CEST6500353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.529664993 CEST53650031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.530081987 CEST6500453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.538480997 CEST53650041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.538794994 CEST6500553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.547342062 CEST53650051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.612266064 CEST6500653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.619395018 CEST53650061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.619996071 CEST6500753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.627775908 CEST53650071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.631938934 CEST6500853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.639558077 CEST53650081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.643929005 CEST6500953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.651439905 CEST53650091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.651680946 CEST6501053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.658690929 CEST53650101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.770008087 CEST6501153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.778047085 CEST53650111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.778417110 CEST6501253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.786442041 CEST53650121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.786699057 CEST6501353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.793981075 CEST53650131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.795650959 CEST6501453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.804603100 CEST53650141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.804826021 CEST6501553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.815947056 CEST53650151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.889008999 CEST6501653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.899485111 CEST53650161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.903985977 CEST6501753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.914329052 CEST53650171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.915860891 CEST6501853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.927432060 CEST53650181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.927839041 CEST6501953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.938215971 CEST53650191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:36.939795017 CEST6502053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:36.947544098 CEST53650201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.094719887 CEST6502153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.102273941 CEST53650211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.102739096 CEST6502253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.120718956 CEST53650221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.121079922 CEST6502353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.130929947 CEST53650231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.131223917 CEST6502453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.142420053 CEST53650241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.142765999 CEST6502553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.152851105 CEST53650251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.226541996 CEST6502653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.233356953 CEST53650261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.233735085 CEST6502753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.242264986 CEST53650271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.242511034 CEST6502853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.250452042 CEST53650281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.250731945 CEST6502953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.262334108 CEST53650291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.262590885 CEST6503053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.270845890 CEST53650301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.328119993 CEST6503153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.336226940 CEST53650311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.336659908 CEST6503253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.347068071 CEST53650321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.347397089 CEST6503353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.356894970 CEST53650331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.357218027 CEST6503453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.366101027 CEST53650341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.366413116 CEST6503553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.375960112 CEST53650351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.448156118 CEST6503653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.455513000 CEST53650361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.455998898 CEST6503753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.464576960 CEST53650371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.464931011 CEST6503853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.473834038 CEST53650381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.474160910 CEST6503953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.482430935 CEST53650391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.482711077 CEST6504053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.490669012 CEST53650401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.587011099 CEST6504153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.594309092 CEST53650411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.595347881 CEST6504253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.602560997 CEST53650421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.602840900 CEST6504353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.610816002 CEST53650431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.611085892 CEST6504453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.619050980 CEST53650441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.619306087 CEST6504553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.626619101 CEST53650451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.691015005 CEST6504653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.700525999 CEST53650461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.700903893 CEST6504753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.708259106 CEST53650471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.709939003 CEST6504853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.717261076 CEST53650481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.718286037 CEST6504953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.725191116 CEST53650491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:37.727700949 CEST6505053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:37.735472918 CEST53650501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.019638062 CEST6505153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.028161049 CEST53650511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.035415888 CEST6505253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.044097900 CEST53650521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.067673922 CEST6505353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.074851036 CEST53650531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.078989983 CEST6505453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.087518930 CEST53650541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.090496063 CEST6505553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.102320910 CEST53650551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.294035912 CEST6390453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.342597961 CEST53639041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.351795912 CEST6390553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.358863115 CEST53639051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.359240055 CEST6390653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.367168903 CEST53639061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.367424011 CEST6390753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.377104998 CEST53639071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.377346992 CEST6390853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.385668993 CEST53639081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.385987043 CEST6390953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.394864082 CEST53639091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.449421883 CEST6391053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.458996058 CEST53639101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.459700108 CEST6391153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.467773914 CEST53639111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.468061924 CEST6391253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.475712061 CEST53639121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.475928068 CEST6391353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.483166933 CEST53639131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.483433962 CEST6391453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.492114067 CEST53639141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.545593977 CEST6391553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.557188034 CEST53639151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.557660103 CEST6391653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.572439909 CEST53639161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.572865009 CEST6391753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.584130049 CEST53639171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.584379911 CEST6391853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.594028950 CEST53639181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.594394922 CEST6391953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.604366064 CEST53639191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.665467978 CEST6392053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.672673941 CEST53639201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.673259020 CEST6392153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.681364059 CEST53639211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.681701899 CEST6392253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.689435005 CEST53639221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.689755917 CEST6392353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.696980000 CEST53639231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.697463989 CEST6392453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.707546949 CEST53639241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.762831926 CEST6392553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.769582033 CEST53639251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.770051003 CEST6392653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.779757023 CEST53639261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.780072927 CEST6392753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.788140059 CEST53639271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.788475990 CEST6392853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.796987057 CEST53639281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.797250032 CEST6392953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.804975033 CEST53639291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.858350992 CEST6393053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.865277052 CEST53639301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.865613937 CEST6393153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.873930931 CEST53639311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.874171019 CEST6393253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.882273912 CEST53639321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.882507086 CEST6393353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.890245914 CEST53639331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.890474081 CEST6393453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.898742914 CEST53639341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.964732885 CEST6393553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.972843885 CEST53639351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.973328114 CEST6393653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.980909109 CEST53639361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.981237888 CEST6393753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.990108967 CEST53639371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.990329027 CEST6393853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:38.998780966 CEST53639381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:38.998986959 CEST6393953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.008569956 CEST53639391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.065936089 CEST6394053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.073302031 CEST53639401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.074135065 CEST6394153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.082510948 CEST53639411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.082721949 CEST6394253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.090025902 CEST53639421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.090315104 CEST6394353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.099092960 CEST53639431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.099304914 CEST6394453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.106934071 CEST53639441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.165482998 CEST6394553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.174242973 CEST53639451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.174678087 CEST6394653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.184715986 CEST53639461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.185062885 CEST6394753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.192775965 CEST53639471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.193039894 CEST6394853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.201867104 CEST53639481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.202291965 CEST6394953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.211051941 CEST53639491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.273901939 CEST6395053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.283036947 CEST53639501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.288126945 CEST6395153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.305676937 CEST53639511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.306035042 CEST6395253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.315874100 CEST53639521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.316179991 CEST6395353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.328111887 CEST53639531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.328464031 CEST6395453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.342255116 CEST53639541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.399626970 CEST6395553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.407737970 CEST53639551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.408128977 CEST6395653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.416706085 CEST53639561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.417030096 CEST6395753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.425957918 CEST53639571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.427853107 CEST6395853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.435482025 CEST53639581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.435771942 CEST6395953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.444327116 CEST53639591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.503860950 CEST6396053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.512113094 CEST53639601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.512522936 CEST6396153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.522696018 CEST53639611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.523201942 CEST6396253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.531423092 CEST53639621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.531805038 CEST6396353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.540843010 CEST53639631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.543822050 CEST6396453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.551621914 CEST53639641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.607870102 CEST6396553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.614871979 CEST53639651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.615906954 CEST6396653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.624439955 CEST53639661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.630139112 CEST6396753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.640789986 CEST53639671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.643769026 CEST6396853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.653794050 CEST53639681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.655769110 CEST6396953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.666222095 CEST53639691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.720071077 CEST6397053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.729990005 CEST53639701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.730488062 CEST6397153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.741302967 CEST53639711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.743824959 CEST6397253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.753851891 CEST53639721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.755928993 CEST6397353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.765093088 CEST53639731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.767703056 CEST6397453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.776458025 CEST53639741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:39.830952883 CEST6397553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:39.838232040 CEST53639751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.316637993 CEST6397653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.324966908 CEST53639761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.325531006 CEST6397753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.332421064 CEST53639771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.332880020 CEST6397853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.339813948 CEST53639781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.340241909 CEST6397953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.348418951 CEST53639791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.421116114 CEST6398053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.669446945 CEST53639801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.802315950 CEST6398153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.811211109 CEST53639811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.812006950 CEST6398253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.819525003 CEST53639821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.819869041 CEST6398353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.827029943 CEST53639831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:40.832395077 CEST6398453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:40.840261936 CEST53639841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.072300911 CEST6398553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.079864979 CEST53639851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.080303907 CEST6398653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.088861942 CEST53639861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.089176893 CEST6398753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.097920895 CEST53639871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.098264933 CEST6398853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.107368946 CEST53639881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.107635021 CEST6398953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.116014004 CEST53639891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.175733089 CEST6399053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.183480978 CEST53639901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.185648918 CEST6399153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.193437099 CEST53639911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.194034100 CEST6399253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.203224897 CEST53639921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.203525066 CEST6399353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.212152004 CEST53639931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.212374926 CEST6399453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.220495939 CEST53639941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.270873070 CEST5793053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.321294069 CEST53579301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.328668118 CEST5793153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.335880041 CEST53579311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.337939978 CEST5793253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.347074032 CEST53579321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.350821018 CEST5793353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.358582973 CEST53579331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.358875036 CEST5793453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.366365910 CEST53579341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.366609097 CEST5793553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.374758959 CEST53579351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.428894043 CEST5793653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.436563969 CEST53579361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.436965942 CEST5793753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.445226908 CEST53579371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.445429087 CEST5793853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.452634096 CEST53579381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.907828093 CEST5793953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.915431023 CEST53579391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.917973042 CEST5794053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.925782919 CEST53579401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.986239910 CEST5794153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:41.993940115 CEST53579411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:41.995536089 CEST5794253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.002737999 CEST53579421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.003735065 CEST5794353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.012836933 CEST53579431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.015825033 CEST5794453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.024343014 CEST53579441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.027895927 CEST5794553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.036051035 CEST53579451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.102188110 CEST5794653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.109010935 CEST53579461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.109388113 CEST5794753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.116529942 CEST53579471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.116754055 CEST5794853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.124409914 CEST53579481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.124682903 CEST5794953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.132740021 CEST53579491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.132982969 CEST5795053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.140968084 CEST53579501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.205518961 CEST5795153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.214406013 CEST53579511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.214720011 CEST5795253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.223905087 CEST53579521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.224128962 CEST5795353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.233815908 CEST53579531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.234081030 CEST5795453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.241185904 CEST53579541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.241405964 CEST5795553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.249574900 CEST53579551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.308511972 CEST5795653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.315216064 CEST53579561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.315563917 CEST5795753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.323031902 CEST53579571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.323435068 CEST5795853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.334364891 CEST53579581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.334604979 CEST5795953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.343674898 CEST53579591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.343903065 CEST5796053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.352111101 CEST53579601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.418396950 CEST5796153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.427419901 CEST53579611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.427753925 CEST5796253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.436772108 CEST53579621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.437041044 CEST5796353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.446510077 CEST53579631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.446877956 CEST5796453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.454224110 CEST53579641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.454437971 CEST5796553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.462158918 CEST53579651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.516848087 CEST5796653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.525028944 CEST53579661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.525610924 CEST5796753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.532813072 CEST53579671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.533006907 CEST5796853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.540445089 CEST53579681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.540602922 CEST5796953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.548484087 CEST53579691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.548738003 CEST5797053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.558912039 CEST53579701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.611505985 CEST5797153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.618493080 CEST53579711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.618915081 CEST5797253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.625942945 CEST53579721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:42.626200914 CEST5797353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:42.632695913 CEST53579731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.155492067 CEST5797453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.163103104 CEST53579741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.163595915 CEST5797553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.170996904 CEST53579751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.448020935 CEST6185653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.704454899 CEST53618561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.742279053 CEST6185753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.750194073 CEST53618571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.753675938 CEST6185853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.761049032 CEST53618581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.761781931 CEST6185953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.769450903 CEST53618591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.769809961 CEST6186053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.779269934 CEST53618601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.781764984 CEST6186153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.791733027 CEST53618611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.852368116 CEST6186253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.859437943 CEST53618621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.861887932 CEST6186353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.869139910 CEST53618631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.870799065 CEST6186453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.878443956 CEST53618641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.879883051 CEST6186553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.889503956 CEST53618651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.890008926 CEST6186653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.899183989 CEST53618661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.952317953 CEST6186753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.959661961 CEST53618671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.963002920 CEST6186853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.970663071 CEST53618681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.971008062 CEST6186953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.978821993 CEST53618691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.979026079 CEST6187053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.986799955 CEST53618701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:43.986974955 CEST6187153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:43.997045040 CEST53618711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.049462080 CEST6187253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.056602955 CEST53618721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.057019949 CEST6187353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.065587044 CEST53618731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.065861940 CEST6187453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.074507952 CEST53618741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.074733019 CEST6187553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.081794024 CEST53618751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.081981897 CEST6187653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.090126991 CEST53618761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.193773985 CEST6187753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.200907946 CEST53618771.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.201432943 CEST6187853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.211451054 CEST53618781.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.211663008 CEST6187953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.219280005 CEST53618791.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.219516039 CEST6188053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.226494074 CEST53618801.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.792917013 CEST6188153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.800676107 CEST53618811.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.857172966 CEST6188253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.864502907 CEST53618821.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.864959002 CEST6188353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.871848106 CEST53618831.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.872128010 CEST6188453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.879987955 CEST53618841.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.880314112 CEST6188553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.888447046 CEST53618851.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.888858080 CEST6188653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.896538973 CEST53618861.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.962213039 CEST6188753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.969548941 CEST53618871.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.969904900 CEST6188853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.977340937 CEST53618881.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.977623940 CEST6188953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.985163927 CEST53618891.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.985438108 CEST6189053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:44.993352890 CEST53618901.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:44.993746996 CEST6189153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.002145052 CEST53618911.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.055677891 CEST6189253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.063226938 CEST53618921.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.063586950 CEST6189353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.071436882 CEST53618931.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.071621895 CEST6189453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.079051971 CEST53618941.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.079261065 CEST6189553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.088665009 CEST53618951.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.088849068 CEST6189653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.095810890 CEST53618961.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.612005949 CEST6189753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.619756937 CEST53618971.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.622064114 CEST6189853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.629997015 CEST53618981.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.632642031 CEST6189953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.643153906 CEST53618991.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.646090031 CEST6190053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.653934002 CEST53619001.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.657785892 CEST6190153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.665822983 CEST53619011.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.722105026 CEST6190253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.730781078 CEST53619021.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.736002922 CEST6190353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.745346069 CEST53619031.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.748699903 CEST6190453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.756841898 CEST53619041.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.757797003 CEST6190553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.765330076 CEST53619051.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.784774065 CEST6190653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.792695045 CEST53619061.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.894398928 CEST6190753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.901797056 CEST53619071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.906487942 CEST6190853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.913922071 CEST53619081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.918154001 CEST6190953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.925575018 CEST53619091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.925785065 CEST6191053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.933631897 CEST53619101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:45.933940887 CEST6191153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:45.942125082 CEST53619111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.027364016 CEST6191253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.034873962 CEST53619121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.038367987 CEST6191353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.046500921 CEST53619131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.049810886 CEST6191453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.057192087 CEST53619141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.058168888 CEST6191553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.065860987 CEST53619151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.069896936 CEST6191653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.078810930 CEST53619161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.182290077 CEST6191753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.189218998 CEST53619171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.189733028 CEST6191853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.197362900 CEST53619181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.197695971 CEST6191953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.205233097 CEST53619191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.205450058 CEST6192053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.213145971 CEST53619201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.213596106 CEST6192153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.222666979 CEST53619211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.347500086 CEST6192253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.354829073 CEST53619221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.357868910 CEST6192353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.365964890 CEST53619231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.370696068 CEST6192453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.379282951 CEST53619241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.382320881 CEST6192553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.392138958 CEST53619251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.395740032 CEST6192653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.404526949 CEST53619261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.458518028 CEST5360753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.509542942 CEST53536071.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.518785954 CEST5360853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.525888920 CEST53536081.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.527837038 CEST5360953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.535367012 CEST53536091.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.537853956 CEST5361053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.549725056 CEST53536101.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.550043106 CEST5361153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.557800055 CEST53536111.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.557995081 CEST5361253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.568562031 CEST53536121.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.629947901 CEST5361353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.636769056 CEST53536131.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.637298107 CEST5361453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.645565033 CEST53536141.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.645925045 CEST5361553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.653628111 CEST53536151.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.655821085 CEST5361653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.663289070 CEST53536161.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.663568974 CEST5361753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.671173096 CEST53536171.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.730370998 CEST5361853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.737744093 CEST53536181.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.739985943 CEST5361953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.971584082 CEST53536191.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.976125002 CEST5362053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.983907938 CEST53536201.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.985980988 CEST5362153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:46.994968891 CEST53536211.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:46.995475054 CEST5362253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.003762960 CEST53536221.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.093381882 CEST5362353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.101119995 CEST53536231.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.102169991 CEST5362453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.110997915 CEST53536241.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.114039898 CEST5362553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.121874094 CEST53536251.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.122137070 CEST5362653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.129791021 CEST53536261.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.130054951 CEST5362753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.137806892 CEST53536271.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.210268021 CEST5362853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.218256950 CEST53536281.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.218703985 CEST5362953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.226377964 CEST53536291.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.226634026 CEST5363053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.234525919 CEST53536301.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.234793901 CEST5363153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.242902994 CEST53536311.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.243248940 CEST5363253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.251497984 CEST53536321.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.309693098 CEST5363353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.318265915 CEST53536331.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.318742990 CEST5363453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.326443911 CEST53536341.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.326749086 CEST5363553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.336560011 CEST53536351.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.336905003 CEST5363653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.344891071 CEST53536361.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.345199108 CEST5363753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.352839947 CEST53536371.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.408494949 CEST5363853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.416878939 CEST53536381.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.417557955 CEST5363953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.427408934 CEST53536391.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.427747965 CEST5364053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.437975883 CEST53536401.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.438242912 CEST5364153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.445274115 CEST53536411.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.447753906 CEST5364253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.455271959 CEST53536421.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.514508963 CEST5364353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.521843910 CEST53536431.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.524008989 CEST5364453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.532052994 CEST53536441.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.536195993 CEST5364553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.543822050 CEST53536451.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.544321060 CEST5364653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.551609039 CEST53536461.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.551958084 CEST5364753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.558552980 CEST53536471.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.612134933 CEST5364853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.621035099 CEST53536481.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.621412039 CEST5364953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.631426096 CEST53536491.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.631702900 CEST5365053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.642121077 CEST53536501.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.642450094 CEST5365153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.651984930 CEST53536511.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.652220964 CEST5365253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.660059929 CEST53536521.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.713586092 CEST5365353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.721082926 CEST53536531.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.721476078 CEST5365453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.733426094 CEST53536541.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.733757973 CEST5365553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.741605043 CEST53536551.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.741822004 CEST5365653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.749207973 CEST53536561.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.749433994 CEST5365753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.757148027 CEST53536571.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.810439110 CEST5365853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.817482948 CEST53536581.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.817873001 CEST5365953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.825464010 CEST53536591.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.826571941 CEST5366053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.835263968 CEST53536601.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.835591078 CEST5366153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.843508005 CEST53536611.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.843705893 CEST5366253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.850975990 CEST53536621.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.906975985 CEST5366353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.914623022 CEST53536631.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.917561054 CEST5366453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.924786091 CEST53536641.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.926285028 CEST5366553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.935065031 CEST53536651.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.937799931 CEST5366653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.946746111 CEST53536661.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:47.947087049 CEST5366753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:47.957619905 CEST53536671.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.016510963 CEST5366853192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.023612022 CEST53536681.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.025903940 CEST5366953192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.033915997 CEST53536691.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.034226894 CEST5367053192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.042006969 CEST53536701.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.044377089 CEST5367153192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.052212954 CEST53536711.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.052509069 CEST5367253192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.060190916 CEST53536721.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.121074915 CEST5367353192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.128180027 CEST53536731.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.128585100 CEST5367453192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.136729956 CEST53536741.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.137007952 CEST5367553192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.145279884 CEST53536751.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.145597935 CEST5367653192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.153398037 CEST53536761.1.1.1192.168.2.11
                                                    Sep 30, 2024 16:05:48.153660059 CEST5367753192.168.2.111.1.1.1
                                                    Sep 30, 2024 16:05:48.161362886 CEST53536771.1.1.1192.168.2.11
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Sep 30, 2024 16:03:47.397953987 CEST192.168.2.111.1.1.10x4554Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.632883072 CEST192.168.2.111.1.1.10xe1ffStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.798232079 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.842344999 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.873744965 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.892214060 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.926783085 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.029576063 CEST192.168.2.111.1.1.10x289Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.099518061 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.107021093 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.117605925 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.132158041 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.149420977 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.676156044 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.683722019 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.693043947 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.707788944 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.717767954 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.828855038 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.837125063 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.858403921 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.867768049 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.887562990 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.349147081 CEST192.168.2.111.1.1.10x1f6dStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.454124928 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.462374926 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.478559017 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.491250992 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.507256985 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.606419086 CEST192.168.2.111.1.1.10xdfc4Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.671022892 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.678781033 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.687797070 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.699287891 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.711653948 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.074201107 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.837495089 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.847398043 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.862097979 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.878218889 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:57.992733002 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.000353098 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.009941101 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.033251047 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.042978048 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.237570047 CEST192.168.2.111.1.1.10xf476Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.296691895 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.304019928 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.319787979 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.330770016 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.351471901 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.454020023 CEST192.168.2.111.1.1.10x28bdStandard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.623466015 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.630812883 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.650238037 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.660161018 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.670676947 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.855673075 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.863650084 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.874269009 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.884248972 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.908628941 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.091366053 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.099628925 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.116621017 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.125299931 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.137382984 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:04.287630081 CEST192.168.2.111.1.1.10xed9Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:04.348058939 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.394287109 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.404962063 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.421288013 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.437685013 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:06.981375933 CEST192.168.2.111.1.1.10xd7a7Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.042352915 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.050723076 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.069257975 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.082108021 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.092994928 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.296057940 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.304882050 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.320780039 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.336591005 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.361706018 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.534271002 CEST192.168.2.111.1.1.10xdfd2Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.713671923 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.721735954 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.742266893 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.750449896 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.767393112 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:10.999357939 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.006737947 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.022906065 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.030731916 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.039280891 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.208085060 CEST192.168.2.111.1.1.10x7439Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.267612934 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.275348902 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.291404009 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.307531118 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.325329065 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.546014071 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.553754091 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.570485115 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.578900099 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.593044043 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:14.746707916 CEST192.168.2.111.1.1.10x7d3Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.019551039 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.027896881 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.038031101 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.046416044 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.054730892 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.308128119 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.315968990 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.326462030 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.336654902 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.345911026 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.529544115 CEST192.168.2.111.1.1.10xc768Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.589742899 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.597275972 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.605940104 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.615679979 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.631155014 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:18.811594963 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:18.994154930 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:19.014723063 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:19.025816917 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:19.042843103 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.211648941 CEST192.168.2.111.1.1.10x4b9dStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.378281116 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.385562897 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.401206970 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.408689022 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.423410892 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:21.941957951 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:21.950232983 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:21.966963053 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:21.995604992 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:22.012712955 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.400167942 CEST192.168.2.111.1.1.10x6aabStandard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.458935976 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.467716932 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.484426975 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.499535084 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.509670019 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.737256050 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.745918989 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.753571987 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.768297911 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.775731087 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:25.880845070 CEST192.168.2.111.1.1.10xea96Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:25.976509094 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:25.984149933 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:25.992275000 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:26.040543079 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:26.056608915 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.236747026 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.244339943 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.259820938 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.276892900 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.288222075 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.479434013 CEST192.168.2.111.1.1.10x2c58Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.537770987 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.547226906 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.556001902 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.569228888 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.579566956 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.710371017 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.721838951 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.730612040 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.739330053 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.754452944 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.850526094 CEST192.168.2.111.1.1.10x6a62Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.947144032 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.955631018 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.969863892 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.980148077 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:31.000895977 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.091449976 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.099128962 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.114670992 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.124763966 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.132370949 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.422940016 CEST192.168.2.111.1.1.10xc758Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.519455910 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.531264067 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.538969994 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.548487902 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.556602955 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.563090086 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.570920944 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.586529970 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.594779015 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.603363037 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.571561098 CEST192.168.2.111.1.1.10xa29aStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.630676031 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.639755011 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.659584045 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.679867029 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.691569090 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.642393112 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.651139021 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.660154104 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.677498102 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.685770988 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.595499039 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.602919102 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.616792917 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.634646893 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.649279118 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.526057959 CEST192.168.2.111.1.1.10x3d46Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.789582968 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.799359083 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.822572947 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.838584900 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.846837044 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.731370926 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.739177942 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.747205019 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.763863087 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.771177053 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.597038984 CEST192.168.2.111.1.1.10xc494Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.690278053 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.699153900 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.717782974 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.742422104 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.750323057 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:41.567104101 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.382127047 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.399621964 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.414079905 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.422332048 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.204268932 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.352864027 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.362364054 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.380310059 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.390188932 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.150959015 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.305594921 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.313292980 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.327964067 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.336977959 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.080777884 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.088836908 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.097557068 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.113097906 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.120738029 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.831598997 CEST192.168.2.111.1.1.10xae59Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.926100016 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.934477091 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.946060896 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.955578089 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.963529110 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.664391041 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.672059059 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.693116903 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.709949970 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.731321096 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.400863886 CEST192.168.2.111.1.1.10x5bdbStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.457556009 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.935235023 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.943519115 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.958353996 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.967104912 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.620944977 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.629703999 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.646342993 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.656088114 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.669651985 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:49.320671082 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.036577940 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.044437885 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.052485943 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.074291945 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.734767914 CEST192.168.2.111.1.1.10xd822Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.778858900 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.789374113 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.797152042 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.807449102 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.815179110 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.416765928 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.424163103 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.432133913 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.441513062 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.449004889 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.032001019 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.041357994 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.052541971 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.060659885 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.068502903 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.623692036 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.631211042 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.651117086 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.659678936 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.667649031 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.228163004 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.235608101 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.250307083 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.258421898 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.268120050 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.963267088 CEST192.168.2.111.1.1.10x6a09Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.063302994 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.070832968 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.079173088 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.087711096 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.095751047 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.616667032 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.624180079 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.631176949 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.646893978 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.661662102 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.171997070 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.180171967 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.188555002 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.197343111 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.206559896 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.691967010 CEST192.168.2.111.1.1.10x26b4Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.749983072 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.758219957 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.765881062 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.782300949 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.789788961 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.294055939 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.306112051 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.314475060 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.323988914 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.348160028 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.795636892 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.807188988 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.822695017 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.831836939 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.842327118 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.294154882 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.302613974 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.310905933 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.320804119 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.328644991 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.778863907 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.786391973 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.795207024 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.802901983 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.810761929 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.227099895 CEST192.168.2.111.1.1.10xb687Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.322304964 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.330256939 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.338046074 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.347958088 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.356167078 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.770442009 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.870629072 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.878861904 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.886713982 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.896403074 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.297887087 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.305377007 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.313180923 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.329834938 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.345920086 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.782042980 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.790081024 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.797652006 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.805763006 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.814344883 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.187239885 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.194963932 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.210783958 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.219058037 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.227055073 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.594161987 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.601950884 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.609694958 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.618174076 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.628402948 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.977452993 CEST192.168.2.111.1.1.10x964dStandard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.995570898 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.002882957 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.010726929 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.021749973 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.029306889 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.625197887 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.632983923 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.642026901 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.649926901 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.665478945 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.001776934 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.010278940 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.026597977 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.040154934 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.057336092 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.463725090 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.483169079 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.505887985 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.522099972 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.538053989 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.870035887 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.877336025 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.887300968 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.898163080 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.907049894 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.232323885 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.239761114 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.250021935 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.257164001 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.267663956 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.563322067 CEST192.168.2.111.1.1.10x6ffcStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.127182007 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.134912014 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.151686907 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.164367914 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.176400900 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.476335049 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.484649897 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.494865894 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.503375053 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.520944118 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.817255020 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.825731039 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.835103035 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.842567921 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.854708910 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.148825884 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.346319914 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.355796099 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.371625900 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.379630089 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.198451042 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.207973957 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.219769955 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.231741905 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.250169039 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.516191006 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.524120092 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.532672882 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.541507006 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.549751997 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.809099913 CEST192.168.2.111.1.1.10x7e09Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.974435091 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.982145071 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.990880966 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.998585939 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.009056091 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.265808105 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.274472952 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.282340050 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.291766882 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.299602985 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.556988955 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.565130949 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.574476004 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.583678961 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.593848944 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.833379030 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.845211983 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.853341103 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.863279104 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.873486042 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.112533092 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.120253086 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.130223989 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.138797998 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.147433043 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.382703066 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.390641928 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.406416893 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.414465904 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.422611952 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.654752970 CEST192.168.2.111.1.1.10x4b18Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.917826891 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.926342964 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.945954084 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.962340117 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.969961882 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.186676979 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.196044922 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.205218077 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.213449001 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.221374035 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.435925961 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.443619967 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.451251030 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.460565090 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.469485998 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.671861887 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.680241108 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.691123962 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.701756001 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.709912062 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.919224024 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.926750898 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.934613943 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.942585945 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.952899933 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.154891968 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.163395882 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.171519041 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.179441929 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.189551115 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.402628899 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.410218954 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.420922041 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.430561066 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.438219070 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.626502991 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.634661913 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.642930031 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.652580976 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.660594940 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.867623091 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.874978065 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.883220911 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.892235994 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.903763056 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.099293947 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.224222898 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.232685089 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.241822004 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.250231028 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.419128895 CEST192.168.2.111.1.1.10xaf2cStandard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.475337982 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.483520031 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.491400957 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.499129057 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.515140057 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.687274933 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.695091963 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.703392982 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.719543934 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.730551958 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.912574053 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.920615911 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.928564072 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.936774015 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.944196939 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.129961014 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.137737989 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.145495892 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.153306961 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.682356119 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.865430117 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.873213053 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.881843090 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.890100956 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.901102066 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.063249111 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.071645021 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.083259106 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.091377974 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.101521969 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.260442972 CEST192.168.2.111.1.1.10xa50fStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.354974985 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.362831116 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.371212959 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.379045010 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.388904095 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.556787968 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.567807913 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.575567007 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.585355043 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.595663071 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.749999046 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.757519960 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.767311096 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.776366949 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.785315990 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.957495928 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.965471983 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.976629972 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.984741926 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.993149996 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.141689062 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.149460077 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.166657925 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.176902056 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.184989929 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.328758001 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.336143017 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.344405890 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.352453947 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.360893965 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.514327049 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.524396896 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.533463955 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.542707920 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.551309109 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.687737942 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.696623087 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.705985069 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.714747906 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.723707914 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.863768101 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.872967958 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.881984949 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.892237902 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.902596951 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.036210060 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.044456959 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.062978029 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.070831060 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.080668926 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.223469973 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.231631994 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.239331007 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.247443914 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.255748987 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.388710022 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.397950888 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.406003952 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.414227009 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.423976898 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.569109917 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.578000069 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.586422920 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.595954895 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.604288101 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.750823021 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.758796930 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.766993046 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.775161982 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.784104109 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.935420990 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.942866087 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.952229977 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.960858107 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.969028950 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.098658085 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.108781099 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.118938923 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.138724089 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.147691965 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.295953035 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.305901051 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.316052914 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.326231956 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.335726976 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.456187963 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.466247082 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.476130962 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.486846924 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.495990038 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.608340979 CEST192.168.2.111.1.1.10x1120Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.665155888 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.672499895 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.681005955 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.689809084 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.697774887 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.814450026 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.821850061 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.832273960 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.840889931 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.848282099 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.990309000 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.997769117 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.006331921 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.014069080 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.023123026 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.140441895 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.147876024 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.157860041 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.166168928 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.174010992 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.289791107 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.297771931 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.305821896 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.315722942 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.323590994 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.442117929 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.451819897 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.459676981 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.471803904 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.483716965 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.599618912 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.607816935 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.619856119 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.630287886 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.642152071 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.750847101 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.759752035 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.767832994 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.779715061 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.787638903 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.896836042 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.907124996 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.919296980 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.927098989 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.934849024 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.061173916 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.075815916 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.086318970 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.099080086 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.107393980 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.219819069 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.230377913 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.240053892 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.249803066 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.261305094 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.352790117 CEST192.168.2.111.1.1.10x7ab1Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.367508888 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.376389027 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.384967089 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.393248081 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.405304909 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.499649048 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.507788897 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.519735098 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.527645111 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.539716959 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.665218115 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.673825026 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.682952881 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.693751097 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.705862999 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.803215981 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.814410925 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.825855970 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.834167004 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.845849037 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.938508987 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.946727991 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.955889940 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.962933064 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.970844984 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.069094896 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.077276945 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.085544109 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.093147039 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.100512028 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.256824970 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.266815901 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.276176929 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.287026882 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.296194077 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.389691114 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.396959066 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.405106068 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.413130999 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.426212072 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.529942036 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.540137053 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.548958063 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.566267014 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.575340986 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.685106039 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.693232059 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.700159073 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.708789110 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.716077089 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.810848951 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.818497896 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.827306986 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.839890957 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.849103928 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.944806099 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.952461004 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.960944891 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.969017982 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.977878094 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.076530933 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.084148884 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.092400074 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.100281000 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.108975887 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.201978922 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.210215092 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.218910933 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.228087902 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.236124992 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.326822042 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.337146044 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.347827911 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.362550020 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.373788118 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.474386930 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.484627962 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.493191004 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.501936913 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.511478901 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.593770027 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.609349012 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.618334055 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.627223015 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.637089014 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.723854065 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.732225895 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.742635012 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.753329992 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.766792059 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.858139038 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.868092060 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.879621029 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.889116049 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.898900986 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.990763903 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.000905991 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.011919975 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.020648956 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.033066034 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.132006884 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.139494896 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.148456097 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.156131983 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.165307045 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.242960930 CEST192.168.2.111.1.1.10x6032Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.415829897 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.423974037 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.432764053 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.441778898 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.451987982 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.528142929 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.536118984 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.545629978 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.554975033 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.562781096 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.644725084 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.652089119 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.660788059 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.668342113 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.676415920 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.774460077 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.782922983 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.793493986 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.803335905 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.811518908 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.889404058 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.897496939 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.906317949 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.915739059 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.926088095 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.019726992 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.031089067 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.043354034 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.052349091 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.063146114 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.165985107 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.173746109 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.181129932 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.189280987 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.199469090 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.281749010 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.289494038 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.300738096 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.310612917 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.320255041 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.405572891 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.418006897 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.427309990 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.435516119 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.443414927 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.530405045 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.543128967 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.551671982 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.562386990 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.572613001 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.655781984 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.663220882 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.672732115 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.680521965 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.687757969 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.773387909 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.781311989 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.799719095 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.808940887 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.819071054 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.891402006 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.899593115 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.907787085 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.915863991 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.923485041 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.004084110 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.014113903 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.023828983 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.034073114 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.045300007 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.142092943 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.150682926 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.160115957 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.175493956 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.186741114 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.259159088 CEST192.168.2.111.1.1.10xf4e2Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.316736937 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.324340105 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.334311962 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.346081972 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.353877068 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.447690964 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.456783056 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.474833012 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.486680984 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.495486975 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.577445030 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.587462902 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.598654985 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.611747980 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.623745918 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.708271980 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.716255903 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.726113081 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.738092899 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.749955893 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.838881016 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.847830057 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.859638929 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.869292974 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.877362013 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.955902100 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.963295937 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.971828938 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.979665995 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.990128994 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.074960947 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.082885981 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.091265917 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.098993063 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.106744051 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.198837996 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.206098080 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.214124918 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.221869946 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.230109930 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.318211079 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.325473070 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.333246946 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.340939999 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.349193096 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.420697927 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.432029009 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.443820000 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.454529047 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.463157892 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.545547962 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.554274082 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.561692953 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.573565006 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.580724955 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.664541960 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.673892975 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.685786963 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.694658995 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.707817078 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.784770012 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.798372984 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.807940006 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.819817066 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.831866026 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.905538082 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.915663958 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.923408031 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.931377888 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.941139936 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.019591093 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.029047966 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.038347960 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.046734095 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.055272102 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.153480053 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.166920900 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.181390047 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.193900108 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.202522039 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.295999050 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.306334019 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.316245079 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.327341080 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.338327885 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.428642988 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.437979937 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.449702024 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.461749077 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.473854065 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.895756006 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.907969952 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.918548107 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.927293062 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.939313889 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.066992998 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.075054884 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.083028078 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.094221115 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.102596045 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.189273119 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.199438095 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.208554983 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.216814041 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.227747917 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.295500994 CEST192.168.2.111.1.1.10x777aStandard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.560513020 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.569796085 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.577836037 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.586421013 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.595462084 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.678802967 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.686451912 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.694022894 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.702610970 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.710947037 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.782349110 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.790056944 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.797714949 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.805569887 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.813155890 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.896861076 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.904794931 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.914958954 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.925398111 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.933362007 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.005386114 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.012712955 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.020703077 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.029191971 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.037587881 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.115876913 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.125483990 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.134308100 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.149194002 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.159982920 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.266616106 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.275876999 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.286081076 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.298571110 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.310497999 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.394856930 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.406682014 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.419925928 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.435849905 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.447860003 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.536215067 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.546941042 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.557959080 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.569905043 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.581995010 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.654259920 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.666032076 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.673835039 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.685908079 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.697813034 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.767122984 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.774606943 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.783044100 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.791786909 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.801209927 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.882160902 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.891182899 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.901417017 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.911789894 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.926637888 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.006213903 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.014487982 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.022802114 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.030967951 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.039505005 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.148926020 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.158294916 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.167464018 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.176856041 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.185575008 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.692295074 CEST192.168.2.111.1.1.10x467Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.786263943 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.796952963 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.805105925 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.812726021 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.820663929 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.892810106 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.901189089 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.912183046 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.920444012 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.929804087 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.015511990 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.023504019 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.037847996 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.050595999 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.063945055 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.148065090 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.160959005 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.174638033 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.188055038 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.202888012 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.286180019 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.297715902 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.308706045 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.320909023 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.330872059 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.406259060 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.414114952 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.423193932 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.430857897 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.442291975 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.517519951 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.527976990 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.536317110 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.547143936 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.558195114 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.626286983 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.636643887 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.646991968 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.661781073 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.672530890 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.749768019 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.757608891 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.766024113 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.774542093 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.782668114 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.864635944 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.872108936 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.881211996 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.890376091 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.898714066 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.966485023 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.973573923 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.981811047 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.991472006 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.000817060 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.080625057 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.090534925 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.099473000 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.108210087 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.118153095 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.190740108 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.201576948 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.211524963 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.221663952 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.230245113 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.300880909 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.308732033 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.317985058 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.325630903 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.333988905 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.406985044 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.415807009 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.423983097 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.432986975 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.441986084 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.516066074 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.523572922 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.531747103 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.539632082 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.548034906 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.624397993 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.632239103 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.639625072 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.647492886 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.655730963 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.732279062 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.743774891 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.751717091 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.767932892 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.779710054 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.856839895 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.870269060 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.882030964 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.893951893 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.906267881 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.989451885 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.001528978 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.011406898 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.021615982 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.031152010 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.116897106 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.126677990 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.135077000 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.150976896 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.164237022 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.240391016 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.252990007 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.265094995 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.278028011 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.292263985 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.374367952 CEST192.168.2.111.1.1.10xc4e4Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.541033983 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.548439980 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.557205915 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.566998959 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.576548100 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.658420086 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.670011997 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.678498030 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.689857960 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.697746038 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.767637014 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.774971962 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.786910057 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.795018911 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.805403948 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.875859022 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.883951902 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.894254923 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.907433987 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.916532040 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.988775969 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.997036934 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.006978035 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.014852047 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.022099972 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.107752085 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.115392923 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.124295950 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.131941080 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.139220953 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.208894968 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.216552019 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.224858999 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.237024069 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.246507883 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.317812920 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.327003956 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.339376926 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.348929882 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.358830929 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.430489063 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.438200951 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.445425034 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.453082085 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.460690022 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.532469034 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.540190935 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.547976971 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.556123972 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.564542055 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.645390034 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.653964043 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.664514065 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.672960997 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.681762934 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.769604921 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.778487921 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.789556026 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.797719955 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.809066057 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.889908075 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.900340080 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.909122944 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.919969082 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.929639101 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.001614094 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.011523008 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.019113064 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.028060913 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.037377119 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.140476942 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.148883104 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.157022953 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.164856911 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.172780991 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.244983912 CEST192.168.2.111.1.1.10x4e68Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.260756016 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.269011021 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.276320934 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.284584045 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.292124987 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.372477055 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.379991055 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.387749910 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.396116018 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.405880928 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.484760046 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.493773937 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.501765013 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.510162115 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.519747019 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.617610931 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.627911091 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.639884949 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.651992083 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.663758993 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.739226103 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.746695995 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.759952068 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.771955967 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.783854961 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.867315054 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.879903078 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.891794920 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.903793097 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.918879986 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.983694077 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.994014978 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.001765966 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.009080887 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.016702890 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.094351053 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.104944944 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.115241051 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.124181032 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.132667065 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.207499027 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.214683056 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.221617937 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.229281902 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.239806890 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.317219019 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.325699091 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.333477020 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.340709925 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.349421978 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.426831007 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.434967995 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.443851948 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.457859993 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.467988968 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.531224012 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.541873932 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.552462101 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.563177109 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.574004889 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.633146048 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.641904116 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.650842905 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.659531116 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.666691065 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.739327908 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.747817039 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.756802082 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.765276909 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.773509979 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.862598896 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.872503042 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.881774902 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.889779091 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.899746895 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.966516972 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.975003004 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.983732939 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.995826006 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.007850885 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.289503098 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.301520109 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.313462019 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.329171896 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.336956024 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.610960007 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.618705988 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.626434088 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.634171963 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.644336939 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.712290049 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.719974995 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.727477074 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.735657930 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.744167089 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.811341047 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.819832087 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.828300953 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.837377071 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.849930048 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.919939041 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.930026054 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.937822104 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.948544025 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.958108902 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.021636963 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.028947115 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.036412954 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.046508074 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.055635929 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.120145082 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.127389908 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.135117054 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.144685030 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.152935028 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.249458075 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.257582903 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.267801046 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.280915022 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.289426088 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.352251053 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.360285044 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.368896008 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.376559019 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.384808064 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.443574905 CEST192.168.2.111.1.1.10xa1Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.503370047 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.512054920 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.521706104 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.530081987 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.538794994 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.612266064 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.619996071 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.631938934 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.643929005 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.651680946 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.770008087 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.778417110 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.786699057 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.795650959 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.804826021 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.889008999 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.903985977 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.915860891 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.927839041 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.939795017 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.094719887 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.102739096 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.121079922 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.131223917 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.142765999 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.226541996 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.233735085 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.242511034 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.250731945 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.262590885 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.328119993 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.336659908 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.347397089 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.357218027 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.366413116 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.448156118 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.455998898 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.464931011 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.474160910 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.482711077 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.587011099 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.595347881 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.602840900 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.611085892 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.619306087 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.691015005 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.700903893 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.709939003 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.718286037 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.727700949 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.019638062 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.035415888 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.067673922 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.078989983 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.090496063 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.294035912 CEST192.168.2.111.1.1.10xc8eaStandard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.351795912 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.359240055 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.367424011 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.377346992 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.385987043 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.449421883 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.459700108 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.468061924 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.475928068 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.483433962 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.545593977 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.557660103 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.572865009 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.584379911 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.594394922 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.665467978 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.673259020 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.681701899 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.689755917 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.697463989 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.762831926 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.770051003 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.780072927 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.788475990 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.797250032 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.858350992 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.865613937 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.874171019 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.882507086 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.890474081 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.964732885 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.973328114 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.981237888 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.990329027 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.998986959 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.065936089 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.074135065 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.082721949 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.090315104 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.099304914 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.165482998 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.174678087 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.185062885 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.193039894 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.202291965 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.273901939 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.288126945 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.306035042 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.316179991 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.328464031 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.399626970 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.408128977 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.417030096 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.427853107 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.435771942 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.503860950 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.512522936 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.523201942 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.531805038 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.543822050 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.607870102 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.615906954 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.630139112 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.643769026 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.655769110 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.720071077 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.730488062 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.743824959 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.755928993 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.767703056 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.830952883 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.316637993 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.325531006 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.332880020 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.340241909 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.421116114 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.802315950 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.812006950 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.819869041 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.832395077 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.072300911 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.080303907 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.089176893 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.098264933 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.107635021 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.175733089 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.185648918 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.194034100 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.203525066 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.212374926 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.270873070 CEST192.168.2.111.1.1.10x5464Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.328668118 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.337939978 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.350821018 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.358875036 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.366609097 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.428894043 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.436965942 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.445429087 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.907828093 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.917973042 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.986239910 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.995536089 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.003735065 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.015825033 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.027895927 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.102188110 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.109388113 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.116754055 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.124682903 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.132982969 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.205518961 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.214720011 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.224128962 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.234081030 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.241405964 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.308511972 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.315563917 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.323435068 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.334604979 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.343903065 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.418396950 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.427753925 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.437041044 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.446877956 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.454437971 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.516848087 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.525610924 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.533006907 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.540602922 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.548738003 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.611505985 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.618915081 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.626200914 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.155492067 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.163595915 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.448020935 CEST192.168.2.111.1.1.10x882Standard query (0)ns1.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.742279053 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.753675938 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.761781931 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.769809961 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.781764984 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.852368116 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.861887932 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.870799065 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.879883051 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.890008926 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.952317953 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.963002920 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.971008062 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.979026079 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.986974955 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.049462080 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.057019949 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.065861940 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.074733019 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.081981897 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.193773985 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.201432943 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.211663008 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.219516039 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.792917013 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.857172966 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.864959002 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.872128010 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.880314112 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.888858080 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.962213039 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.969904900 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.977623940 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.985438108 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.993746996 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.055677891 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.063586950 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.071621895 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.079261065 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.088849068 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.612005949 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.622064114 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.632642031 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.646090031 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.657785892 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.722105026 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.736002922 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.748699903 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.757797003 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.784774065 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.894398928 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.906487942 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.918154001 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.925785065 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.933940887 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.027364016 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.038367987 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.049810886 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.058168888 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.069896936 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.182290077 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.189733028 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.197695971 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.205450058 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.213596106 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.347500086 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.357868910 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.370696068 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.382320881 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.395740032 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.458518028 CEST192.168.2.111.1.1.10x8b94Standard query (0)ns2.cloud-name.ruA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.518785954 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.527837038 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.537853956 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.550043106 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.557995081 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.629947901 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.637298107 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.645925045 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.655821085 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.663568974 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.730370998 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.739985943 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.976125002 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.985980988 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.995475054 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.093381882 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.102169991 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.114039898 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.122137070 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.130054951 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.210268021 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.218703985 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.226634026 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.234793901 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.243248940 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.309693098 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.318742990 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.326749086 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.336905003 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.345199108 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.408494949 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.417557955 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.427747965 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.438242912 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.447753906 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.514508963 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.524008989 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.536195993 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.544321060 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.551958084 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.612134933 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.621412039 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.631702900 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.642450094 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.652220964 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.713586092 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.721476078 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.733757973 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.741822004 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.749433994 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.810439110 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.817873001 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.826571941 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.835591078 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.843705893 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.906975985 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.917561054 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.926285028 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.937799931 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.947087049 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.016510963 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.025903940 CEST192.168.2.111.1.1.10x2Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.034226894 CEST192.168.2.111.1.1.10x3Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.044377089 CEST192.168.2.111.1.1.10x4Standard query (0)ransomware.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.052509069 CEST192.168.2.111.1.1.10x5Standard query (0)ransomware.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.121074915 CEST192.168.2.111.1.1.10x1Standard query (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.128585100 CEST192.168.2.111.1.1.10x2Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.137007952 CEST192.168.2.111.1.1.10x3Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.145597935 CEST192.168.2.111.1.1.10x4Standard query (0)zonealarm.bitA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.153660059 CEST192.168.2.111.1.1.10x5Standard query (0)zonealarm.bit28IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Sep 30, 2024 16:03:47.680965900 CEST1.1.1.1192.168.2.110xe1ffName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.805489063 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.871238947 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.889507055 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.926399946 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:47.935403109 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.088488102 CEST1.1.1.1192.168.2.110x289Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.106600046 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.117207050 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.131844997 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.149068117 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:49.158987045 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.683156013 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.692665100 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.707458973 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.717467070 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:50.737943888 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.836666107 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.857816935 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.867506981 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.887192965 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:51.896087885 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.435378075 CEST1.1.1.1192.168.2.110x1f6dName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.461950064 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.478097916 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.490907907 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.506895065 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:53.516374111 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.657802105 CEST1.1.1.1192.168.2.110xdfc4Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.678339005 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.687315941 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.698839903 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.707211018 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:54.727705956 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.836749077 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.847038984 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.861613989 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.877643108 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:56.891129971 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:57.999921083 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.009596109 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.032846928 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.042644978 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:58.057732105 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.285491943 CEST1.1.1.1192.168.2.110xf476Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.303621054 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.319468021 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.330456972 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.350780964 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:03:59.366853952 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.610440969 CEST1.1.1.1192.168.2.110x28bdName error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.630398989 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.649519920 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.659753084 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.670264006 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:00.686781883 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.863192081 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.873826027 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.883842945 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.908102989 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:01.928551912 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.098648071 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.116215944 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.124727964 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.135585070 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:03.150015116 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:04.336779118 CEST1.1.1.1192.168.2.110xed9Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.393795013 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.404474974 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.420907021 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.437273026 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:05.453911066 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.031116009 CEST1.1.1.1192.168.2.110xd7a7Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.049798012 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.068737984 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.081748009 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.092657089 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:07.109291077 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.304173946 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.320239067 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.336157084 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.361104012 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:08.377526045 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.697345018 CEST1.1.1.1192.168.2.110xdfd2Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.721174002 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.741790056 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.749995947 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.766967058 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:09.779350996 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.006304979 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.022349119 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.030344963 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.038984060 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:11.047502995 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.257260084 CEST1.1.1.1192.168.2.110x7439Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.274775028 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.290659904 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.307190895 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.324875116 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:12.341464043 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.553267956 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.570120096 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.578596115 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.592706919 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:13.603951931 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.008519888 CEST1.1.1.1192.168.2.110x7d3Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.027267933 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.037590981 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.045941114 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.054208040 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:15.062285900 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.315550089 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.326114893 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.336224079 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.345469952 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:16.354556084 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.578751087 CEST1.1.1.1192.168.2.110xc768Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.596712112 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.605592012 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.615161896 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.630722046 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:17.640847921 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:18.993335009 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:19.014178038 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:19.025468111 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:19.042473078 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:19.053687096 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.368280888 CEST1.1.1.1192.168.2.110x4b9dName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.385109901 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.400547028 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.408437967 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.423118114 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:20.433808088 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:21.949076891 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:21.966165066 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:21.981168985 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:22.002841949 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:22.022468090 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.448793888 CEST1.1.1.1192.168.2.110x6aabName error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.467268944 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.484067917 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.499228954 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.509365082 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:23.530438900 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.745419979 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.753271103 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.768012047 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.775418997 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:24.784169912 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:25.966466904 CEST1.1.1.1192.168.2.110xea96Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:25.983437061 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:25.991871119 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:26.039942026 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:26.056350946 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:26.064404964 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.243802071 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.259430885 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.276513100 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.287839890 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:27.302649975 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.527673960 CEST1.1.1.1192.168.2.110x2c58Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.546701908 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.555650949 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.568897963 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.579083920 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:28.589957952 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.719471931 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.729110956 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.738178968 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.754086971 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:29.764384031 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.937041998 CEST1.1.1.1192.168.2.110x6a62Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.955058098 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.969449997 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:30.979613066 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:31.000426054 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:31.020565033 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.098752975 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.114301920 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.124341011 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.132179976 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:32.140723944 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.510096073 CEST1.1.1.1192.168.2.110xc758Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.530755997 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.538676023 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.548229933 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.556344986 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:33.564141035 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.570430994 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.586143017 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.594559908 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.603159904 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:34.611448050 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.620667934 CEST1.1.1.1192.168.2.110xa29aName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.639117002 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.656002998 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.675667048 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.687429905 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:35.700293064 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.650800943 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.659907103 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.677251101 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.685513973 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:36.694166899 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.602462053 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.614917040 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.634232044 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.648922920 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:37.656883001 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.782001019 CEST1.1.1.1192.168.2.110x3d46Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.798826933 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.821994066 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.838181019 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.846627951 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:38.866648912 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.738771915 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.746893883 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.763490915 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.770860910 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:39.779083967 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.682077885 CEST1.1.1.1192.168.2.110xc494Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.698074102 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.714271069 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.737967014 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.749912024 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:40.758110046 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.381412029 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.399029016 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.413646936 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.421993017 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:42.432146072 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.352175951 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.361932039 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.379834890 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.389545918 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:43.398680925 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.304833889 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.312887907 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.327604055 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.336777925 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:44.353435040 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.088253975 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.096915007 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.112756014 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.120394945 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.128200054 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.916619062 CEST1.1.1.1192.168.2.110xae59Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.933974028 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.945554972 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.955214024 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.963253021 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:45.971112013 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.671577930 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.692682028 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.709444046 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.730784893 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:46.740237951 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.450015068 CEST1.1.1.1192.168.2.110x5bdbName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.934752941 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.943288088 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.958163023 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.966937065 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:47.975147009 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.629255056 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.645946026 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.655735970 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.669296980 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:48.683312893 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.036127090 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.044127941 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.052251101 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.073954105 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.092200994 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.743048906 CEST1.1.1.1192.168.2.110xd822Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.788976908 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.796871901 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.807179928 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.814907074 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:50.822787046 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.423712969 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.431791067 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.441293001 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.448802948 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:51.464116096 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.040864944 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.052123070 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.060431004 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.068263054 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.079049110 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.630850077 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.650851011 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.659377098 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.667408943 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:52.682557106 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.235227108 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.249922991 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.258213997 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.267873049 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:53.275789976 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.055732012 CEST1.1.1.1192.168.2.110x6a09Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.070451975 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.078763008 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.087455034 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.095500946 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.111157894 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.623800993 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.630956888 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.646595955 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.661380053 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:54.677218914 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.179794073 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.188234091 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.197125912 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.206298113 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.216953993 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.742280960 CEST1.1.1.1192.168.2.110x26b4Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.757857084 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.765604019 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.782012939 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.789581060 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:55.799020052 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.301989079 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.314131975 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.323225021 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.347783089 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.355468988 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.806607962 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.822257042 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.831594944 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.842083931 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:56.851170063 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.302054882 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.310596943 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.320215940 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.328283072 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.336616039 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.785934925 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.794851065 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.802653074 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.810511112 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:57.818612099 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.315054893 CEST1.1.1.1192.168.2.110xb687Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.329849005 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.337655067 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.347700119 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.355885983 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.365712881 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.869823933 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.878515005 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.886473894 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.896030903 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:58.904687881 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.304934978 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.312912941 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.329603910 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.345633030 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.354187012 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.789711952 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.797369957 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.805442095 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.814049006 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:04:59.822900057 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.194535971 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.210370064 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.218848944 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.226843119 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.235249996 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.601340055 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.609399080 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.617897034 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.628146887 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.637717962 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:00.988385916 CEST1.1.1.1192.168.2.110x964dName error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.002465010 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.010458946 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.021387100 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.029055119 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.282668114 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.632359028 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.641716003 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.649665117 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.665033102 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:01.672703981 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.009691000 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.026263952 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.039841890 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.057096004 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.066117048 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.471477032 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.491008043 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.521517992 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.536942005 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.545844078 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.876892090 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.886986017 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.897954941 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.906904936 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:02.915596008 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.239275932 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.249654055 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.256980896 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.267438889 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:03.276134014 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.119267941 CEST1.1.1.1192.168.2.110x6ffcName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.134474039 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.151204109 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.164022923 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.176042080 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.184489965 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.484221935 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.494529963 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.503040075 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.520575047 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.531461000 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.824585915 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.834780931 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.842367887 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.854196072 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:04.863455057 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.345813990 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.355393887 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.371164083 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.379452944 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:05.929912090 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.205008030 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.216595888 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.228921890 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.247901917 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.258550882 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.523674965 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.532346964 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.541296959 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.549505949 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.557760954 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.967264891 CEST1.1.1.1192.168.2.110x7e09Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.981817007 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.990622997 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:06.998410940 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.008851051 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.018627882 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.274144888 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.282157898 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.291516066 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.299352884 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.308556080 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.564784050 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.573903084 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.583506107 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.593651056 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.603869915 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.844738007 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.853120089 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.863070011 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.873229980 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:07.881139040 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.119924068 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.130013943 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.138586044 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.147253036 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.156975031 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.390141964 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.405989885 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.414294958 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.422420025 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.446954966 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.910636902 CEST1.1.1.1192.168.2.110x4b18Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.925929070 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.945589066 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.962122917 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.969650030 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:08.977685928 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.195703983 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.204880953 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.213116884 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.221060038 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.229831934 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.443181992 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.450952053 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.460340023 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.469206095 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.477446079 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.679717064 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.690781116 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.701442957 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.709672928 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.717926979 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.926336050 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.934312105 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.942301035 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.952641964 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:09.961074114 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.163033962 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.171156883 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.179213047 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.189198017 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.198618889 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.409861088 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.420655966 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.430295944 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.437906027 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.446307898 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.634164095 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.642579079 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.652357101 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.660384893 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.676611900 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.874588966 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.882987022 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.891994953 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.903520107 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:10.914664984 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.223617077 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.232260942 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.241544962 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.249990940 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.257467031 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.467832088 CEST1.1.1.1192.168.2.110xaf2cName error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.483004093 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.491023064 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.498867989 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.514673948 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.524724007 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.694679022 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.703074932 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.719177008 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.730251074 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.740802050 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.920253038 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.928301096 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.936547041 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.943924904 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:11.952310085 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.137418985 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.145252943 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.153043985 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.682041883 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.690615892 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.872667074 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.881536961 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.889833927 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.900830030 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:12.908994913 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.071286917 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.082920074 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.091080904 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.101130962 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.110130072 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.346955061 CEST1.1.1.1192.168.2.110xa50fName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.362365961 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.370825052 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.378753901 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.388580084 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.405129910 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.567395926 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.575340033 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.585155010 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.595474005 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.603451967 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.757106066 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.766925097 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.776031017 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.784972906 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.793528080 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.965051889 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.976349115 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.984446049 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:13.992924929 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.001133919 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.148869991 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.164772034 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.176157951 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.184405088 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.192173004 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.335659027 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.344050884 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.352216959 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.360641956 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.369548082 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.523714066 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.532888889 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.542349100 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.550981998 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.560986996 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.696178913 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.705538034 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.714451075 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.723473072 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.732516050 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.872438908 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.881489992 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.891948938 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.902328014 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:14.911604881 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.044116974 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.062622070 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.070594072 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.080388069 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.089385033 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.231134892 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.238966942 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.247267008 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.255589008 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.267139912 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.397620916 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.405746937 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.414021969 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.423716068 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.433161974 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.577647924 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.586170912 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.595730066 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.604044914 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.613384962 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.758441925 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.766711950 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.774918079 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.783857107 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.791768074 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.942548037 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.952008009 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.960643053 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.968811989 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:15.979340076 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.108411074 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.118721962 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.138514042 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.147506952 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.155951023 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.305548906 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.315732002 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.326005936 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.335525036 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.346502066 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.465732098 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.475931883 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.486651897 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.495739937 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.506211996 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.657994032 CEST1.1.1.1192.168.2.110x1120Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.672173977 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.680825949 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.689639091 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.697593927 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.706274986 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.821348906 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.830755949 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.840527058 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.847985983 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.856379986 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:16.997385979 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.006081104 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.013842106 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.022838116 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.032011032 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.147530079 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.157478094 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.165889978 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.173815966 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.185079098 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.297225952 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.305598021 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.315438032 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.323348999 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.331494093 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.450798988 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.459429979 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.469007015 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.481389046 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.492947102 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.607110023 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.617027044 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.628341913 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.638206005 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.652472973 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.757889032 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.766988993 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.775901079 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.787255049 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.796238899 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.906738997 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.918931007 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.926841974 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.934638023 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:17.943346977 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.071921110 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.086064100 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.098849058 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.107156038 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.117928982 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.229660034 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.239845991 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.249584913 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.260401964 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.269575119 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.360522985 CEST1.1.1.1192.168.2.110x7ab1Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.375947952 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.384716988 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.393047094 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.405092001 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.413289070 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.507323027 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.515693903 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.527097940 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.536106110 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.549726963 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.673032999 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.681556940 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.690542936 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.702301025 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.713385105 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.811127901 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.822592020 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.833914995 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.842125893 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.853877068 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.946283102 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.955601931 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.962677002 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.970623970 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:18.977720022 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.076970100 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.085342884 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.092950106 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.100321054 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.107572079 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.266485929 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.275909901 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.286777973 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.295888901 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.304775953 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.396684885 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.404866934 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.412969112 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.425950050 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.442455053 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.539674044 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.548657894 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.566015005 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.575136900 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.583798885 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.692284107 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.699870110 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.708576918 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.715810061 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.724035978 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.818192959 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.827080011 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.839658022 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.848869085 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.856901884 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.952115059 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.960709095 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.968795061 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.977653980 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:19.985336065 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.083803892 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.092164040 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.100063086 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.108757973 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.116709948 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.209804058 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.218614101 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.227822065 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.235903978 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.243860960 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.336643934 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.347410917 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.359872103 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.371260881 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.381227970 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.484292030 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.493016005 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.501631975 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.511221886 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.520860910 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.608961105 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.618153095 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.627038002 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.636878967 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.646514893 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.731904984 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.742326975 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.753098965 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.766549110 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.775505066 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.867520094 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.879122019 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.888818026 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.898636103 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:20.908092976 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.000571966 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.011467934 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.020350933 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.032634020 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.042469025 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.139127016 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.148214102 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.155934095 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.165126085 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.173832893 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.408685923 CEST1.1.1.1192.168.2.110x6032Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.423535109 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.432442904 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.441478968 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.451785088 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.461518049 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.535753965 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.545193911 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.554769993 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.562508106 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.570096970 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.651762009 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.660533905 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.668131113 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.676233053 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.687393904 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.782520056 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.793200016 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.802947044 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.811206102 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.819394112 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.896935940 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.906059027 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.915522099 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.925770044 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:21.936922073 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.030699968 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.042943001 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.052095890 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.062891960 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.075294018 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.173202991 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.180855989 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.189038992 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.197493076 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.208173990 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.289108992 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.300419092 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.310370922 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.320038080 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.329185963 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.414979935 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.426980019 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.435194969 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.443221092 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.451905012 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.542753935 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.551475048 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.562202930 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.572424889 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.580672979 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.662733078 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.672349930 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.680294991 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.687558889 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.697953939 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.780927896 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.797408104 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.808677912 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.817226887 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.826427937 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.899137020 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.907460928 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.915644884 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.923176050 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:22.932420015 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.013648987 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.023557901 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.033741951 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.045028925 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.054693937 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.150324106 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.159877062 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.175225019 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.186479092 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.196043015 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.306926966 CEST1.1.1.1192.168.2.110xf4e2Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.323904991 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.331924915 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.342660904 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.353099108 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.362307072 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.454993010 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.466114044 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.482865095 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.493825912 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.503556013 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.584703922 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.595645905 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.606197119 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.619887114 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.630852938 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.715823889 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.724251032 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.733787060 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.745542049 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.759488106 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.846009016 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.856679916 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.869051933 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.877156973 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.887227058 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.962954998 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.971584082 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.979357004 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.989790916 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:23.997736931 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.082483053 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.090959072 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.098752975 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.106452942 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.114494085 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.205651045 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.213736057 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.221571922 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.229867935 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.239270926 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.325120926 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.333014965 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.340692043 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.348875046 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.356261015 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.429052114 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.440329075 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.451561928 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.462796926 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.472714901 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.553900957 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.561463118 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.573175907 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.580466986 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.590636015 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.671652079 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.682769060 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.693958998 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.703079939 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.717847109 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.793633938 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.807173967 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.816781044 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.829797983 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.840212107 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.912286043 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.923187017 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.931143999 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.940905094 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:24.949662924 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.028683901 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.038009882 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.046366930 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.054646015 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.064013004 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.166217089 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.179598093 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.193520069 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.202208996 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.211699009 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.305960894 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.315910101 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.326961994 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.338021994 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.348546982 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.437052011 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.448698997 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.458723068 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.470807076 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.486057043 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.903223038 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.916834116 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.926867962 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.936692953 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:25.947643995 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.074664116 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.082412004 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.093909025 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.102248907 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.111548901 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.198554039 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.207195044 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.216051102 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.224267960 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.237102032 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.551830053 CEST1.1.1.1192.168.2.110x777aName error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.569169044 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.577341080 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.586193085 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.595104933 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.602533102 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.686065912 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.693726063 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.702332020 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.710714102 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.718909979 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.789563894 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.797430038 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.805255890 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.812865973 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.821238995 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.904174089 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.914350033 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.925060034 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.933144093 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:26.943727016 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.012243986 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.020347118 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.028836966 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.037302017 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.044933081 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.125072002 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.134028912 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.148889065 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.159545898 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.169934034 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.275336027 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.285757065 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.296511889 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.310112000 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.322292089 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.404603004 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.417272091 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.433387041 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.446165085 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.460994005 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.545825958 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.554878950 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.567177057 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.577491999 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.589917898 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.663047075 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.673283100 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.682198048 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.694736004 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.706492901 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.774179935 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.782682896 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.791491032 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.800935030 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.809792042 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.890777111 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.901025057 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.910283089 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.919501066 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:27.938184977 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.014054060 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.022352934 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.030643940 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.038995028 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.049151897 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.157773972 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.166850090 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.176384926 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.185295105 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.193043947 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.778930902 CEST1.1.1.1192.168.2.110x467Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.796533108 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.804868937 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.812464952 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.820385933 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.828438997 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.900619030 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.911845922 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.920063972 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.929557085 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:28.938888073 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.023122072 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.037544012 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.050307989 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.063668966 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.077683926 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.160187006 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.174285889 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.187670946 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.202558041 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.214927912 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.297205925 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.308290958 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.320486069 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.330476046 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.338264942 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.413707018 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.422823906 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.430613995 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.442034006 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.450009108 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.527586937 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.536094904 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.546920061 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.557996035 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.568145037 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.635688066 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.646612883 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.656786919 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.672234058 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.683408976 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.757189035 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.765692949 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.774312973 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.782407045 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.791635036 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.871783972 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.880956888 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.890135050 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.898454905 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.906219959 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.973234892 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.981494904 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:29.991095066 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.000538111 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.010402918 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.090164900 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.099196911 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.107981920 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.117938042 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.126991987 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.201138973 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.211292982 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.221343040 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.229899883 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.237246037 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.308012962 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.317678928 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.325211048 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.333520889 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.342778921 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.414135933 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.423485994 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.432743073 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.441582918 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.449856043 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.523122072 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.531500101 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.539347887 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.547771931 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.556744099 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.631613016 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.639353037 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.647301912 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.654995918 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.662990093 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.739875078 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.751331091 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.763676882 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.778188944 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.787709951 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.866767883 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.878844976 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.892421961 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.905775070 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:30.918101072 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.001034021 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.010885954 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.021042109 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.030828953 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.040769100 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.126297951 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.134754896 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.150654078 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.163921118 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.177027941 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.252540112 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.264750957 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.277678013 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.291789055 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.300276041 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.529920101 CEST1.1.1.1192.168.2.110xc4e4Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.547977924 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.556984901 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.566562891 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.576179981 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.584379911 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.669508934 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.678162098 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.687035084 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.696943045 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.706300974 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.774578094 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.786483049 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.794728994 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.805104971 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.813803911 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.883413076 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.893064022 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.904542923 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.916198015 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.924680948 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:31.996522903 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.006738901 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.014565945 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.021883965 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.033220053 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.115063906 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.124058962 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.131721020 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.139031887 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.146259069 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.216195107 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.224592924 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.236722946 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.245832920 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.255624056 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.326643944 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.338900089 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.348618031 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.358535051 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.368628025 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.437671900 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.445197105 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.452842951 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.460465908 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.469785929 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.539745092 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.547583103 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.555670977 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.564285040 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.571994066 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.652791977 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.662101030 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.672750950 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.681598902 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.690849066 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.777612925 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.785912991 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.797439098 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.806994915 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.817009926 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.899808884 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.908869028 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.919466019 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.929222107 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:32.939675093 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.010929108 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.018740892 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.027683973 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.036915064 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.045066118 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.148422003 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.156493902 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.164593935 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.172529936 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.180901051 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.252309084 CEST1.1.1.1192.168.2.110x4e68Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.268488884 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.275973082 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.284245014 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.291821003 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.300251007 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.379554987 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.387135983 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.395814896 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.403362989 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.413696051 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.492125034 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.501007080 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.509536028 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.518354893 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.528088093 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.625416994 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.638463974 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.647515059 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.659394026 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.671494007 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.746339083 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.754432917 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.768201113 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.780502081 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.794429064 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.874183893 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.887774944 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.899051905 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.917238951 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.926573038 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:33.990896940 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.000785112 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.008784056 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.016338110 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.023734093 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.104237080 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.114860058 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.123827934 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.132324934 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.144345045 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.214339018 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.221375942 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.229036093 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.239546061 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.248090982 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.325203896 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.333142042 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.340424061 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.349143982 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.358011007 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.434053898 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.443187952 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.452737093 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.467582941 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.476982117 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.541491985 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.552112103 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.562926054 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.573788881 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.581140041 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.640430927 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.649382114 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.659104109 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.666316032 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.674671888 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.746860027 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.756526947 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.764918089 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.773303032 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.781006098 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.869678974 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.881424904 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.889520884 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.897368908 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.907139063 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.973567963 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.982652903 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:34.991461039 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.004189968 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.016786098 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.298579931 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.310157061 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.321177006 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.336376905 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.344886065 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.618331909 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.626156092 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.633904934 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.644077063 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.652584076 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.719420910 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.727174044 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.735375881 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.743869066 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.752341032 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.818923950 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.827558994 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.836960077 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.845675945 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.857367039 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.927573919 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.937342882 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.945893049 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.956505060 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:35.965960026 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.028527975 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.036135912 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.046184063 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.055299997 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.064059973 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.127022028 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.134825945 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.144399881 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.152657032 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.161041975 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.257117987 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.267427921 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.280574083 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.289102077 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.297250032 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.359870911 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.368628025 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.376075983 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.384187937 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.393696070 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.493020058 CEST1.1.1.1192.168.2.110xa1Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.510965109 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.519740105 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.529664993 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.538480997 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.547342062 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.619395018 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.627775908 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.639558077 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.651439905 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.658690929 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.778047085 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.786442041 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.793981075 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.804603100 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.815947056 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.899485111 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.914329052 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.927432060 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.938215971 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:36.947544098 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.102273941 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.120718956 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.130929947 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.142420053 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.152851105 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.233356953 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.242264986 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.250452042 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.262334108 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.270845890 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.336226940 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.347068071 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.356894970 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.366101027 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.375960112 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.455513000 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.464576960 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.473834038 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.482430935 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.490669012 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.594309092 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.602560997 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.610816002 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.619050980 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.626619101 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.700525999 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.708259106 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.717261076 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.725191116 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:37.735472918 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.028161049 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.044097900 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.074851036 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.087518930 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.102320910 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.342597961 CEST1.1.1.1192.168.2.110xc8eaName error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.358863115 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.367168903 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.377104998 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.385668993 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.394864082 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.458996058 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.467773914 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.475712061 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.483166933 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.492114067 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.557188034 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.572439909 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.584130049 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.594028950 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.604366064 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.672673941 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.681364059 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.689435005 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.696980000 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.707546949 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.769582033 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.779757023 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.788140059 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.796987057 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.804975033 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.865277052 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.873930931 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.882273912 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.890245914 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.898742914 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.972843885 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.980909109 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.990108967 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:38.998780966 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.008569956 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.073302031 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.082510948 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.090025902 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.099092960 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.106934071 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.174242973 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.184715986 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.192775965 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.201867104 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.211051941 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.283036947 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.305676937 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.315874100 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.328111887 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.342255116 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.407737970 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.416706085 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.425957918 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.435482025 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.444327116 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.512113094 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.522696018 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.531423092 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.540843010 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.551621914 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.614871979 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.624439955 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.640789986 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.653794050 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.666222095 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.729990005 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.741302967 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.753851891 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.765093088 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:39.776458025 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.315733910 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.324966908 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.332421064 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.339813948 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.348418951 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.669446945 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.811211109 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.819525003 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.827029943 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:40.840261936 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.079864979 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.088861942 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.097920895 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.107368946 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.116014004 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.183480978 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.193437099 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.203224897 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.212152004 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.220495939 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.321294069 CEST1.1.1.1192.168.2.110x5464Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.335880041 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.347074032 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.358582973 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.366365910 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.374758959 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.436563969 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.445226908 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.906358957 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.915431023 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.925782919 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:41.993940115 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.002737999 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.012836933 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.024343014 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.036051035 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.109010935 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.116529942 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.124409914 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.132740021 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.140968084 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.214406013 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.223905087 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.233815908 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.241185904 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.249574900 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.315216064 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.323031902 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.334364891 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.343674898 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.352111101 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.427419901 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.436772108 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.446510077 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.454224110 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.462158918 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.525028944 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.532813072 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.540445089 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.548484087 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.558912039 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.618493080 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:42.625942945 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.154913902 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.163103104 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.170996904 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.704454899 CEST1.1.1.1192.168.2.110x882Name error (3)ns1.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.750194073 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.761049032 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.769450903 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.779269934 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.791733027 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.859437943 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.869139910 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.878443956 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.889503956 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.899183989 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.959661961 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.970663071 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.978821993 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.986799955 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:43.997045040 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.056602955 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.065587044 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.074507952 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.081794024 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.090126991 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.200907946 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.211451054 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.219280005 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.791217089 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.800676107 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.864502907 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.871848106 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.879987955 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.888447046 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.896538973 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.969548941 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.977340937 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.985163927 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:44.993352890 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.002145052 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.063226938 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.071436882 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.079051971 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.088665009 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.550004005 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.619756937 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.629997015 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.643153906 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.653934002 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.665822983 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.730781078 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.745346069 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.756841898 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.765330076 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.792695045 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.901797056 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.913922071 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.925575018 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.933631897 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:45.942125082 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.034873962 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.046500921 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.057192087 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.065860987 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.078810930 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.189218998 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.197362900 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.205233097 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.213145971 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.222666979 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.354829073 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.365964890 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.379282951 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.392138958 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.404526949 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.509542942 CEST1.1.1.1192.168.2.110x8b94Name error (3)ns2.cloud-name.runonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.525888920 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.535367012 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.549725056 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.557800055 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.568562031 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.636769056 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.645565033 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.653628111 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.663289070 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.671173096 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.737744093 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.971584082 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.983907938 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:46.994968891 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.003762960 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.101119995 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.110997915 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.121874094 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.129791021 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.137806892 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.218256950 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.226377964 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.234525919 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.242902994 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.251497984 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.318265915 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.326443911 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.336560011 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.344891071 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.352839947 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.416878939 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.427408934 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.437975883 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.445274115 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.455271959 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.521843910 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.532052994 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.543822050 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.551609039 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.558552980 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.621035099 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.631426096 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.642121077 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.651984930 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.660059929 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.721082926 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.733426094 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.741605043 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.749207973 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.757148027 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.817482948 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.825464010 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.835263968 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.843508005 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.850975990 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.914623022 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.924786091 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.935065031 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.946746111 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:47.957619905 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.023612022 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.033915997 CEST1.1.1.1192.168.2.110x2Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.042006969 CEST1.1.1.1192.168.2.110x3Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.052212954 CEST1.1.1.1192.168.2.110x4Name error (3)ransomware.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.060190916 CEST1.1.1.1192.168.2.110x5Name error (3)ransomware.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.128180027 CEST1.1.1.1192.168.2.110x1No error (0)1.1.1.1.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.136729956 CEST1.1.1.1192.168.2.110x2Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.145279884 CEST1.1.1.1192.168.2.110x3Name error (3)zonealarm.bitnonenone28IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.153398037 CEST1.1.1.1192.168.2.110x4Name error (3)zonealarm.bitnonenoneA (IP address)IN (0x0001)false
                                                    Sep 30, 2024 16:05:48.161362886 CEST1.1.1.1192.168.2.110x5Name error (3)zonealarm.bitnonenone28IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:10:03:42
                                                    Start date:30/09/2024
                                                    Path:C:\Users\user\Desktop\file.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                    Imagebase:0xe00000
                                                    File size:749'568 bytes
                                                    MD5 hash:5027E6B49AB2616A8F08F4C868B90DBA
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000003.1583615305.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000003.1583581493.0000000000BBF000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:1
                                                    Start time:10:03:42
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\dllhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                    Imagebase:0x7ff7782e0000
                                                    File size:21'312 bytes
                                                    MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:10:03:46
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:10:03:46
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:10:03:47
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:10:03:47
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:10:03:49
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:10:03:49
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:10:03:50
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:10:03:50
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:10:03:51
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:10:03:52
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:10:03:53
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:10:03:53
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:10:03:53
                                                    Start date:30/09/2024
                                                    Path:C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
                                                    Imagebase:0xfd0000
                                                    File size:749'568 bytes
                                                    MD5 hash:792DCCE2F5F5C326C8A2A36E993BB215
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    Antivirus matches:
                                                    • Detection: 100%, Avira
                                                    • Detection: 100%, Joe Sandbox ML
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:10:03:54
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:10:03:54
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:10:03:56
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:19
                                                    Start time:10:03:56
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:21
                                                    Start time:10:03:58
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:22
                                                    Start time:10:03:58
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:23
                                                    Start time:10:03:59
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:24
                                                    Start time:10:03:59
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:25
                                                    Start time:10:04:00
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:26
                                                    Start time:10:04:00
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:27
                                                    Start time:10:04:01
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:28
                                                    Start time:10:04:01
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:29
                                                    Start time:10:04:02
                                                    Start date:30/09/2024
                                                    Path:C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\dwqocx.exe"
                                                    Imagebase:0xfd0000
                                                    File size:749'568 bytes
                                                    MD5 hash:792DCCE2F5F5C326C8A2A36E993BB215
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    Has exited:true

                                                    Target ID:30
                                                    Start time:10:04:03
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:31
                                                    Start time:10:04:03
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:32
                                                    Start time:10:04:05
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:33
                                                    Start time:10:04:05
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:34
                                                    Start time:10:04:07
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:35
                                                    Start time:10:04:07
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:36
                                                    Start time:10:04:08
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:37
                                                    Start time:10:04:08
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:38
                                                    Start time:10:04:09
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:39
                                                    Start time:10:04:09
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:40
                                                    Start time:10:04:11
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:41
                                                    Start time:10:04:11
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:42
                                                    Start time:10:04:12
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:43
                                                    Start time:10:04:12
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:44
                                                    Start time:10:04:13
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:45
                                                    Start time:10:04:13
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:46
                                                    Start time:10:04:15
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:47
                                                    Start time:10:04:15
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:48
                                                    Start time:10:04:16
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:49
                                                    Start time:10:04:16
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:50
                                                    Start time:10:04:17
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:51
                                                    Start time:10:04:17
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:52
                                                    Start time:10:04:19
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:53
                                                    Start time:10:04:19
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:54
                                                    Start time:10:04:20
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:55
                                                    Start time:10:04:20
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:56
                                                    Start time:10:04:21
                                                    Start date:30/09/2024
                                                    Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                    Imagebase:0x7ff7d7750000
                                                    File size:468'120 bytes
                                                    MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                    Has elevated privileges:true
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:57
                                                    Start time:10:04:21
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:58
                                                    Start time:10:04:22
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:59
                                                    Start time:10:04:22
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:60
                                                    Start time:10:04:23
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:61
                                                    Start time:10:04:23
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:62
                                                    Start time:10:04:24
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:63
                                                    Start time:10:04:24
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:64
                                                    Start time:10:04:26
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:65
                                                    Start time:10:04:26
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:67
                                                    Start time:10:04:27
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:68
                                                    Start time:10:04:27
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:69
                                                    Start time:10:04:28
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup zonealarm.bit ns2.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:70
                                                    Start time:10:04:28
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:71
                                                    Start time:10:04:29
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:nslookup ransomware.bit ns1.cloud-name.ru
                                                    Imagebase:0x5d0000
                                                    File size:77'824 bytes
                                                    MD5 hash:9D2EB13476B126CB61B12CDD03C7DCA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:72
                                                    Start time:10:04:29
                                                    Start date:30/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff68cce0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:9.5%
                                                      Dynamic/Decrypted Code Coverage:45.7%
                                                      Signature Coverage:23.4%
                                                      Total number of Nodes:1529
                                                      Total number of Limit Nodes:138
                                                      execution_graph 9751 e0123b 9752 e01247 __mtinitlocknum 9751->9752 9786 e01de0 GetProcessHeap 9752->9786 9754 e0129c 9755 e012a7 9754->9755 9880 e0138f 9754->9880 9787 e01a4c 9755->9787 9758 e012ad 9759 e012b8 __RTC_Initialize 9758->9759 9760 e0138f _fast_error_exit 58 API calls 9758->9760 9808 e01df5 9759->9808 9760->9759 9762 e012c7 9763 e012d3 GetCommandLineA 9762->9763 9765 e0138f _fast_error_exit 58 API calls 9762->9765 9827 e026fc GetEnvironmentStringsW 9763->9827 9767 e012d2 9765->9767 9767->9763 9770 e012f8 9851 e022d8 9770->9851 9774 e01309 9867 e01b63 9774->9867 9775 e01b29 __lock 58 API calls 9775->9774 9777 e01311 9778 e0131c 9777->9778 9779 e01b29 __lock 58 API calls 9777->9779 9873 e011a8 OpenProcess GetLastError 9778->9873 9779->9778 9786->9754 9895 e01bfb EncodePointer 9787->9895 9789 e01a51 9900 e032a1 9789->9900 9792 e01a5a 9904 e01ac2 9792->9904 9797 e01a77 9916 e03327 9797->9916 9800 e01ab9 9801 e01ac2 __mtterm 61 API calls 9800->9801 9803 e01abe 9801->9803 9803->9758 9804 e01a98 9804->9800 9805 e01a9e 9804->9805 9925 e01999 9805->9925 9807 e01aa6 GetCurrentThreadId 9807->9758 9809 e01e01 __mtinitlocknum 9808->9809 9810 e03170 __lock 58 API calls 9809->9810 9811 e01e08 9810->9811 9812 e03327 __calloc_crt 58 API calls 9811->9812 9813 e01e19 9812->9813 9814 e01e84 GetStartupInfoW 9813->9814 9815 e01e24 __mtinitlocknum @_EH4_CallFilterFunc@8 9813->9815 9822 e01e99 9814->9822 9823 e01fc8 9814->9823 9815->9762 9816 e02090 10187 e020a0 9816->10187 9818 e03327 __calloc_crt 58 API calls 9818->9822 9819 e02015 GetStdHandle 9819->9823 9820 e01ee7 9820->9823 9824 e01f1b GetFileType 9820->9824 9825 e02e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9820->9825 9821 e02028 GetFileType 9821->9823 9822->9818 9822->9820 9822->9823 9823->9816 9823->9819 9823->9821 9826 e02e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9823->9826 9824->9820 9825->9820 9826->9823 9828 e0270f WideCharToMultiByte 9827->9828 9833 e012e3 9827->9833 9830 e02742 9828->9830 9831 e02779 FreeEnvironmentStringsW 9828->9831 9832 e0336f __malloc_crt 58 API calls 9830->9832 9831->9833 9834 e02748 9832->9834 9840 e020a9 9833->9840 9834->9831 9835 e0274f WideCharToMultiByte 9834->9835 9836 e02765 9835->9836 9837 e0276e FreeEnvironmentStringsW 9835->9837 9838 e032ef _free 58 API calls 9836->9838 9837->9833 9839 e0276b 9838->9839 9839->9837 9841 e020b7 9840->9841 9842 e020bc GetModuleFileNameA 9840->9842 10197 e0375a 9841->10197 9843 e020e9 9842->9843 10191 e0215c 9843->10191 9847 e012ed 9847->9770 9888 e01b29 9847->9888 9848 e0336f __malloc_crt 58 API calls 9849 e02122 9848->9849 9849->9847 9850 e0215c _parse_cmdline 58 API calls 9849->9850 9850->9847 9852 e022e1 9851->9852 9854 e022e6 _strlen 9851->9854 9853 e0375a ___initmbctable 71 API calls 9852->9853 9853->9854 9855 e03327 __calloc_crt 58 API calls 9854->9855 9858 e012fe 9854->9858 9863 e0231c _strlen 9855->9863 9856 e0236e 9857 e032ef _free 58 API calls 9856->9857 9857->9858 9858->9774 9858->9775 9859 e03327 __calloc_crt 58 API calls 9859->9863 9860 e02395 9861 e032ef _free 58 API calls 9860->9861 9861->9858 9863->9856 9863->9858 9863->9859 9863->9860 9864 e023ac 9863->9864 10617 e04942 9863->10617 9865 e04041 __invoke_watson 8 API calls 9864->9865 9866 e023b8 9865->9866 9869 e01b6f __IsNonwritableInCurrentImage 9867->9869 10626 e04381 9869->10626 9870 e01b8d __initterm_e 9872 e01bac __cinit __IsNonwritableInCurrentImage 9870->9872 10629 e0436c 9870->10629 9872->9777 9874 e01203 9873->9874 9875 e0120a 9873->9875 9876 e01204 ExitProcess 9874->9876 10695 e01113 9875->10695 9879 e01234 ExitThread 9881 e013a0 9880->9881 9882 e0139b 9880->9882 9884 e02416 __NMSG_WRITE 58 API calls 9881->9884 9883 e023b9 __FF_MSGBANNER 58 API calls 9882->9883 9883->9881 9885 e013a8 9884->9885 9886 e01b13 __mtinitlocknum 3 API calls 9885->9886 9887 e013b2 9886->9887 9887->9755 9889 e023b9 __FF_MSGBANNER 58 API calls 9888->9889 9890 e01b31 9889->9890 9891 e02416 __NMSG_WRITE 58 API calls 9890->9891 9892 e01b39 9891->9892 11525 e01be7 9892->11525 9896 e01c0c __init_pointers __initp_misc_winsig 9895->9896 9935 e02d9f EncodePointer 9896->9935 9898 e01c24 __init_pointers 9899 e02e9e 34 API calls 9898->9899 9899->9789 9901 e032ad 9900->9901 9902 e01a56 9901->9902 9936 e02e2e 9901->9936 9902->9792 9913 e02db0 9902->9913 9905 e01acc 9904->9905 9910 e01ad2 9904->9910 9939 e02dce 9905->9939 9907 e031ba DeleteCriticalSection 9942 e032ef 9907->9942 9908 e031d6 9911 e031e2 DeleteCriticalSection 9908->9911 9912 e01a5f 9908->9912 9910->9907 9910->9908 9911->9908 9912->9758 9914 e01a6c 9913->9914 9915 e02dc7 TlsAlloc 9913->9915 9914->9792 9914->9797 9917 e0332e 9916->9917 9919 e01a84 9917->9919 9921 e0334c 9917->9921 9968 e04f38 9917->9968 9919->9800 9922 e02e0c 9919->9922 9921->9917 9921->9919 9976 e03137 Sleep 9921->9976 9923 e02e22 9922->9923 9924 e02e26 TlsSetValue 9922->9924 9923->9804 9924->9804 9926 e019a5 __mtinitlocknum 9925->9926 9979 e03170 9926->9979 9928 e019e2 9986 e01a3a 9928->9986 9931 e03170 __lock 58 API calls 9932 e01a03 ___addlocaleref 9931->9932 9989 e01a43 9932->9989 9934 e01a2e __mtinitlocknum 9934->9807 9935->9898 9937 e02e4b InitializeCriticalSectionAndSpinCount 9936->9937 9938 e02e3e 9936->9938 9937->9901 9938->9901 9940 e02de1 9939->9940 9941 e02de5 TlsFree 9939->9941 9940->9910 9941->9910 9943 e03321 __dosmaperr 9942->9943 9944 e032f8 HeapFree 9942->9944 9943->9910 9944->9943 9945 e0330d 9944->9945 9948 e040a0 9945->9948 9951 e0192a GetLastError 9948->9951 9950 e03313 GetLastError 9950->9943 9965 e02ded 9951->9965 9953 e0193f 9954 e0198d SetLastError 9953->9954 9955 e03327 __calloc_crt 55 API calls 9953->9955 9954->9950 9956 e01952 9955->9956 9956->9954 9957 e02e0c __getptd_noexit TlsSetValue 9956->9957 9958 e01966 9957->9958 9959 e01984 9958->9959 9960 e0196c 9958->9960 9961 e032ef _free 55 API calls 9959->9961 9962 e01999 __initptd 55 API calls 9960->9962 9963 e0198a 9961->9963 9964 e01974 GetCurrentThreadId 9962->9964 9963->9954 9964->9954 9966 e02e04 TlsGetValue 9965->9966 9967 e02e00 9965->9967 9966->9953 9967->9953 9969 e04f43 9968->9969 9975 e04f5e 9968->9975 9970 e04f4f 9969->9970 9969->9975 9971 e040a0 __mtinitlocknum 57 API calls 9970->9971 9973 e04f54 9971->9973 9972 e04f6e HeapAlloc 9972->9973 9972->9975 9973->9917 9975->9972 9975->9973 9977 e043a0 DecodePointer 9975->9977 9976->9921 9978 e043b3 9977->9978 9978->9975 9980 e03181 9979->9980 9981 e03194 EnterCriticalSection 9979->9981 9992 e031f8 9980->9992 9981->9928 9983 e03187 9983->9981 9984 e01b29 __lock 57 API calls 9983->9984 9985 e03193 9984->9985 9985->9981 10185 e032da LeaveCriticalSection 9986->10185 9988 e019fc 9988->9931 10186 e032da LeaveCriticalSection 9989->10186 9991 e01a4a 9991->9934 9993 e03204 __mtinitlocknum 9992->9993 9994 e03223 9993->9994 10014 e023b9 9993->10014 10003 e03246 __mtinitlocknum 9994->10003 10056 e0336f 9994->10056 10001 e03250 10004 e03170 __lock 58 API calls 10001->10004 10002 e03241 10006 e040a0 __mtinitlocknum 58 API calls 10002->10006 10003->9983 10007 e03257 10004->10007 10006->10003 10008 e03264 10007->10008 10009 e0327c 10007->10009 10010 e02e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 10008->10010 10011 e032ef _free 58 API calls 10009->10011 10012 e03270 10010->10012 10011->10012 10062 e03298 10012->10062 10065 e025e0 10014->10065 10016 e023c0 10017 e023cd 10016->10017 10019 e025e0 __NMSG_WRITE 58 API calls 10016->10019 10018 e02416 __NMSG_WRITE 58 API calls 10017->10018 10021 e023ef 10017->10021 10020 e023e5 10018->10020 10019->10017 10022 e02416 __NMSG_WRITE 58 API calls 10020->10022 10023 e02416 10021->10023 10022->10021 10024 e02434 __NMSG_WRITE 10023->10024 10026 e025e0 __NMSG_WRITE 55 API calls 10024->10026 10052 e0255b 10024->10052 10028 e02447 10026->10028 10027 e025c4 10053 e01b13 10027->10053 10029 e02560 GetStdHandle 10028->10029 10030 e025e0 __NMSG_WRITE 55 API calls 10028->10030 10033 e0256e _strlen 10029->10033 10029->10052 10031 e02458 10030->10031 10031->10029 10032 e0246a 10031->10032 10032->10052 10095 e04a97 10032->10095 10036 e025a7 WriteFile 10033->10036 10033->10052 10036->10052 10037 e02497 GetModuleFileNameW 10039 e024b7 10037->10039 10043 e024c7 __NMSG_WRITE 10037->10043 10038 e025c8 10040 e04041 __invoke_watson 8 API calls 10038->10040 10041 e04a97 __NMSG_WRITE 55 API calls 10039->10041 10042 e025d2 10040->10042 10041->10043 10043->10038 10044 e0250d 10043->10044 10104 e04b0c 10043->10104 10044->10038 10113 e04a2b 10044->10113 10048 e04a2b __NMSG_WRITE 55 API calls 10049 e02544 10048->10049 10049->10038 10050 e0254b 10049->10050 10122 e04bca EncodePointer 10050->10122 10147 e013c0 10052->10147 10162 e01adf GetModuleHandleExW 10053->10162 10058 e0337d 10056->10058 10059 e0323a 10058->10059 10061 e03390 10058->10061 10165 e04dfb 10058->10165 10059->10001 10059->10002 10061->10058 10061->10059 10183 e03137 Sleep 10061->10183 10184 e032da LeaveCriticalSection 10062->10184 10064 e0329f 10064->10003 10066 e025ea 10065->10066 10067 e025f4 10066->10067 10068 e040a0 __mtinitlocknum 58 API calls 10066->10068 10067->10016 10069 e02610 10068->10069 10072 e04031 10069->10072 10075 e04006 DecodePointer 10072->10075 10076 e04019 10075->10076 10081 e04041 IsProcessorFeaturePresent 10076->10081 10079 e04006 __cftof_l 8 API calls 10080 e0261b 10079->10080 10080->10016 10082 e0404c 10081->10082 10087 e03ed2 10082->10087 10086 e04030 10086->10079 10088 e03eec _memset __call_reportfault 10087->10088 10089 e03f0c IsDebuggerPresent 10088->10089 10090 e0315a __call_reportfault SetUnhandledExceptionFilter UnhandledExceptionFilter 10089->10090 10093 e03fd0 __call_reportfault 10090->10093 10091 e013c0 __cftof_l 6 API calls 10092 e03ff3 10091->10092 10094 e03145 GetCurrentProcess TerminateProcess 10092->10094 10093->10091 10094->10086 10096 e04aa2 10095->10096 10097 e04ab0 10095->10097 10096->10097 10102 e04ac9 10096->10102 10098 e040a0 __mtinitlocknum 58 API calls 10097->10098 10099 e04aba 10098->10099 10100 e04031 __cftof_l 9 API calls 10099->10100 10101 e0248a 10100->10101 10101->10037 10101->10038 10102->10101 10103 e040a0 __mtinitlocknum 58 API calls 10102->10103 10103->10099 10108 e04b1a 10104->10108 10105 e04b1e 10106 e040a0 __mtinitlocknum 58 API calls 10105->10106 10107 e04b23 10105->10107 10112 e04b4e 10106->10112 10107->10044 10108->10105 10108->10107 10110 e04b5d 10108->10110 10109 e04031 __cftof_l 9 API calls 10109->10107 10110->10107 10111 e040a0 __mtinitlocknum 58 API calls 10110->10111 10111->10112 10112->10109 10114 e04a45 10113->10114 10117 e04a37 10113->10117 10115 e040a0 __mtinitlocknum 58 API calls 10114->10115 10116 e04a4f 10115->10116 10118 e04031 __cftof_l 9 API calls 10116->10118 10117->10114 10120 e04a71 10117->10120 10119 e0252d 10118->10119 10119->10038 10119->10048 10120->10119 10121 e040a0 __mtinitlocknum 58 API calls 10120->10121 10121->10116 10123 e04bfe ___crtIsPackagedApp 10122->10123 10124 e04cbd IsDebuggerPresent 10123->10124 10125 e04c0d LoadLibraryExW 10123->10125 10128 e04ce2 10124->10128 10129 e04cc7 10124->10129 10126 e04c24 GetLastError 10125->10126 10127 e04c4a GetProcAddress 10125->10127 10131 e04c33 LoadLibraryExW 10126->10131 10137 e04cda 10126->10137 10132 e04c5e 7 API calls 10127->10132 10127->10137 10130 e04ce7 DecodePointer 10128->10130 10133 e04cd5 10128->10133 10129->10133 10134 e04cce OutputDebugStringW 10129->10134 10130->10137 10131->10127 10131->10137 10135 e04ca6 GetProcAddress EncodePointer 10132->10135 10136 e04cba 10132->10136 10133->10137 10138 e04d0e DecodePointer DecodePointer 10133->10138 10145 e04d26 10133->10145 10134->10133 10135->10136 10136->10124 10141 e013c0 __cftof_l 6 API calls 10137->10141 10138->10145 10139 e04d4a DecodePointer 10139->10137 10140 e04d5e DecodePointer 10140->10139 10143 e04d65 10140->10143 10144 e04dac 10141->10144 10143->10139 10146 e04d76 DecodePointer 10143->10146 10144->10052 10145->10139 10145->10140 10146->10139 10148 e013c8 10147->10148 10149 e013ca IsProcessorFeaturePresent 10147->10149 10148->10027 10151 e029d5 10149->10151 10154 e02984 IsDebuggerPresent 10151->10154 10155 e02999 __call_reportfault 10154->10155 10160 e0315a SetUnhandledExceptionFilter UnhandledExceptionFilter 10155->10160 10158 e029be 10158->10027 10159 e029a1 __call_reportfault 10161 e03145 GetCurrentProcess TerminateProcess 10159->10161 10160->10159 10161->10158 10163 e01af8 GetProcAddress 10162->10163 10164 e01b0a ExitProcess 10162->10164 10163->10164 10166 e04e76 10165->10166 10167 e04e07 10165->10167 10168 e043a0 __calloc_impl DecodePointer 10166->10168 10174 e04e12 10167->10174 10169 e04e7c 10168->10169 10171 e040a0 __mtinitlocknum 57 API calls 10169->10171 10170 e023b9 __FF_MSGBANNER 57 API calls 10170->10174 10172 e04e82 10171->10172 10172->10058 10173 e04e3a HeapAlloc 10173->10174 10182 e04e6e 10173->10182 10174->10167 10174->10170 10174->10173 10175 e02416 __NMSG_WRITE 57 API calls 10174->10175 10176 e04e62 10174->10176 10177 e043a0 __calloc_impl DecodePointer 10174->10177 10179 e01b13 __mtinitlocknum 3 API calls 10174->10179 10180 e04e60 10174->10180 10175->10174 10178 e040a0 __mtinitlocknum 57 API calls 10176->10178 10177->10174 10178->10180 10179->10174 10181 e040a0 __mtinitlocknum 57 API calls 10180->10181 10181->10182 10182->10172 10183->10061 10184->10064 10185->9988 10186->9991 10190 e032da LeaveCriticalSection 10187->10190 10189 e020a7 10189->9815 10190->10189 10193 e0217e 10191->10193 10196 e021e2 10193->10196 10201 e0492c 10193->10201 10194 e020ff 10194->9847 10194->9848 10195 e0492c _parse_cmdline 58 API calls 10195->10196 10196->10194 10196->10195 10198 e03763 10197->10198 10200 e0376a 10197->10200 10505 e03b3f 10198->10505 10200->9842 10204 e048d2 10201->10204 10207 e03778 10204->10207 10206 e048e4 10206->10193 10208 e03789 10207->10208 10214 e037d6 10207->10214 10215 e01912 10208->10215 10211 e037b6 10211->10214 10235 e03a99 10211->10235 10214->10206 10216 e0192a __getptd_noexit 58 API calls 10215->10216 10217 e01918 10216->10217 10218 e01925 10217->10218 10219 e01b29 __lock 58 API calls 10217->10219 10218->10211 10220 e0368f 10218->10220 10219->10218 10221 e0369b __mtinitlocknum 10220->10221 10222 e01912 __setmbcp 58 API calls 10221->10222 10223 e036a4 10222->10223 10224 e036d3 10223->10224 10226 e036b7 10223->10226 10225 e03170 __lock 58 API calls 10224->10225 10227 e036da 10225->10227 10228 e01912 __setmbcp 58 API calls 10226->10228 10247 e0370f 10227->10247 10230 e036bc 10228->10230 10232 e036ca __mtinitlocknum 10230->10232 10234 e01b29 __lock 58 API calls 10230->10234 10232->10211 10234->10232 10236 e03aa5 __mtinitlocknum 10235->10236 10237 e01912 __setmbcp 58 API calls 10236->10237 10238 e03aaf 10237->10238 10239 e03ac1 10238->10239 10240 e03170 __lock 58 API calls 10238->10240 10241 e03acf __mtinitlocknum 10239->10241 10243 e01b29 __lock 58 API calls 10239->10243 10245 e03adf 10240->10245 10241->10214 10242 e03b0c 10501 e03b36 10242->10501 10243->10241 10245->10242 10246 e032ef _free 58 API calls 10245->10246 10246->10242 10248 e036ee 10247->10248 10249 e0371a ___addlocaleref ___removelocaleref 10247->10249 10251 e03706 10248->10251 10249->10248 10254 e03495 10249->10254 10500 e032da LeaveCriticalSection 10251->10500 10253 e0370d 10253->10230 10255 e034aa 10254->10255 10256 e0350e 10254->10256 10255->10256 10259 e034db 10255->10259 10268 e032ef _free 58 API calls 10255->10268 10257 e0355b 10256->10257 10258 e032ef _free 58 API calls 10256->10258 10265 e03584 10257->10265 10324 e05115 10257->10324 10261 e0352f 10258->10261 10262 e034f9 10259->10262 10272 e032ef _free 58 API calls 10259->10272 10263 e032ef _free 58 API calls 10261->10263 10267 e032ef _free 58 API calls 10262->10267 10266 e03542 10263->10266 10270 e035e3 10265->10270 10280 e032ef 58 API calls _free 10265->10280 10273 e032ef _free 58 API calls 10266->10273 10274 e03503 10267->10274 10275 e034d0 10268->10275 10269 e032ef _free 58 API calls 10269->10265 10271 e032ef _free 58 API calls 10270->10271 10276 e035e9 10271->10276 10277 e034ee 10272->10277 10278 e03550 10273->10278 10279 e032ef _free 58 API calls 10274->10279 10284 e04fb2 10275->10284 10276->10248 10312 e050ae 10277->10312 10283 e032ef _free 58 API calls 10278->10283 10279->10256 10280->10265 10283->10257 10285 e04fc1 10284->10285 10286 e050aa 10284->10286 10287 e04fd2 10285->10287 10289 e032ef _free 58 API calls 10285->10289 10286->10259 10288 e04fe4 10287->10288 10290 e032ef _free 58 API calls 10287->10290 10291 e04ff6 10288->10291 10292 e032ef _free 58 API calls 10288->10292 10289->10287 10290->10288 10293 e05008 10291->10293 10294 e032ef _free 58 API calls 10291->10294 10292->10291 10295 e0501a 10293->10295 10297 e032ef _free 58 API calls 10293->10297 10294->10293 10296 e0502c 10295->10296 10298 e032ef _free 58 API calls 10295->10298 10299 e0503e 10296->10299 10300 e032ef _free 58 API calls 10296->10300 10297->10295 10298->10296 10301 e05050 10299->10301 10302 e032ef _free 58 API calls 10299->10302 10300->10299 10303 e05062 10301->10303 10305 e032ef _free 58 API calls 10301->10305 10302->10301 10304 e05074 10303->10304 10306 e032ef _free 58 API calls 10303->10306 10307 e05086 10304->10307 10308 e032ef _free 58 API calls 10304->10308 10305->10303 10306->10304 10309 e05098 10307->10309 10310 e032ef _free 58 API calls 10307->10310 10308->10307 10309->10286 10311 e032ef _free 58 API calls 10309->10311 10310->10309 10311->10286 10313 e050b9 10312->10313 10323 e05111 10312->10323 10314 e050c9 10313->10314 10315 e032ef _free 58 API calls 10313->10315 10316 e050db 10314->10316 10317 e032ef _free 58 API calls 10314->10317 10315->10314 10318 e050ed 10316->10318 10319 e032ef _free 58 API calls 10316->10319 10317->10316 10320 e050ff 10318->10320 10321 e032ef _free 58 API calls 10318->10321 10319->10318 10322 e032ef _free 58 API calls 10320->10322 10320->10323 10321->10320 10322->10323 10323->10262 10325 e03579 10324->10325 10326 e05124 10324->10326 10325->10269 10327 e032ef _free 58 API calls 10326->10327 10328 e0512c 10327->10328 10329 e032ef _free 58 API calls 10328->10329 10330 e05134 10329->10330 10331 e032ef _free 58 API calls 10330->10331 10332 e0513c 10331->10332 10333 e032ef _free 58 API calls 10332->10333 10334 e05144 10333->10334 10335 e032ef _free 58 API calls 10334->10335 10336 e0514c 10335->10336 10337 e032ef _free 58 API calls 10336->10337 10338 e05154 10337->10338 10339 e032ef _free 58 API calls 10338->10339 10340 e0515b 10339->10340 10341 e032ef _free 58 API calls 10340->10341 10342 e05163 10341->10342 10343 e032ef _free 58 API calls 10342->10343 10344 e0516b 10343->10344 10345 e032ef _free 58 API calls 10344->10345 10346 e05173 10345->10346 10347 e032ef _free 58 API calls 10346->10347 10348 e0517b 10347->10348 10349 e032ef _free 58 API calls 10348->10349 10350 e05183 10349->10350 10351 e032ef _free 58 API calls 10350->10351 10352 e0518b 10351->10352 10353 e032ef _free 58 API calls 10352->10353 10354 e05193 10353->10354 10355 e032ef _free 58 API calls 10354->10355 10356 e0519b 10355->10356 10357 e032ef _free 58 API calls 10356->10357 10358 e051a3 10357->10358 10359 e032ef _free 58 API calls 10358->10359 10360 e051ae 10359->10360 10361 e032ef _free 58 API calls 10360->10361 10362 e051b6 10361->10362 10363 e032ef _free 58 API calls 10362->10363 10364 e051be 10363->10364 10365 e032ef _free 58 API calls 10364->10365 10366 e051c6 10365->10366 10367 e032ef _free 58 API calls 10366->10367 10368 e051ce 10367->10368 10369 e032ef _free 58 API calls 10368->10369 10370 e051d6 10369->10370 10371 e032ef _free 58 API calls 10370->10371 10372 e051de 10371->10372 10373 e032ef _free 58 API calls 10372->10373 10374 e051e6 10373->10374 10375 e032ef _free 58 API calls 10374->10375 10376 e051ee 10375->10376 10377 e032ef _free 58 API calls 10376->10377 10378 e051f6 10377->10378 10379 e032ef _free 58 API calls 10378->10379 10380 e051fe 10379->10380 10381 e032ef _free 58 API calls 10380->10381 10382 e05206 10381->10382 10383 e032ef _free 58 API calls 10382->10383 10384 e0520e 10383->10384 10385 e032ef _free 58 API calls 10384->10385 10386 e05216 10385->10386 10387 e032ef _free 58 API calls 10386->10387 10388 e0521e 10387->10388 10389 e032ef _free 58 API calls 10388->10389 10390 e05226 10389->10390 10391 e032ef _free 58 API calls 10390->10391 10392 e05234 10391->10392 10393 e032ef _free 58 API calls 10392->10393 10394 e0523f 10393->10394 10395 e032ef _free 58 API calls 10394->10395 10396 e0524a 10395->10396 10397 e032ef _free 58 API calls 10396->10397 10398 e05255 10397->10398 10399 e032ef _free 58 API calls 10398->10399 10400 e05260 10399->10400 10401 e032ef _free 58 API calls 10400->10401 10402 e0526b 10401->10402 10403 e032ef _free 58 API calls 10402->10403 10404 e05276 10403->10404 10405 e032ef _free 58 API calls 10404->10405 10406 e05281 10405->10406 10407 e032ef _free 58 API calls 10406->10407 10408 e0528c 10407->10408 10409 e032ef _free 58 API calls 10408->10409 10410 e05297 10409->10410 10411 e032ef _free 58 API calls 10410->10411 10412 e052a2 10411->10412 10413 e032ef _free 58 API calls 10412->10413 10414 e052ad 10413->10414 10415 e032ef _free 58 API calls 10414->10415 10416 e052b8 10415->10416 10417 e032ef _free 58 API calls 10416->10417 10418 e052c3 10417->10418 10419 e032ef _free 58 API calls 10418->10419 10420 e052ce 10419->10420 10421 e032ef _free 58 API calls 10420->10421 10422 e052d9 10421->10422 10423 e032ef _free 58 API calls 10422->10423 10424 e052e7 10423->10424 10425 e032ef _free 58 API calls 10424->10425 10426 e052f2 10425->10426 10427 e032ef _free 58 API calls 10426->10427 10428 e052fd 10427->10428 10429 e032ef _free 58 API calls 10428->10429 10430 e05308 10429->10430 10431 e032ef _free 58 API calls 10430->10431 10432 e05313 10431->10432 10433 e032ef _free 58 API calls 10432->10433 10434 e0531e 10433->10434 10435 e032ef _free 58 API calls 10434->10435 10436 e05329 10435->10436 10437 e032ef _free 58 API calls 10436->10437 10438 e05334 10437->10438 10439 e032ef _free 58 API calls 10438->10439 10440 e0533f 10439->10440 10441 e032ef _free 58 API calls 10440->10441 10442 e0534a 10441->10442 10443 e032ef _free 58 API calls 10442->10443 10444 e05355 10443->10444 10445 e032ef _free 58 API calls 10444->10445 10446 e05360 10445->10446 10447 e032ef _free 58 API calls 10446->10447 10448 e0536b 10447->10448 10449 e032ef _free 58 API calls 10448->10449 10450 e05376 10449->10450 10451 e032ef _free 58 API calls 10450->10451 10452 e05381 10451->10452 10453 e032ef _free 58 API calls 10452->10453 10454 e0538c 10453->10454 10455 e032ef _free 58 API calls 10454->10455 10456 e0539a 10455->10456 10457 e032ef _free 58 API calls 10456->10457 10458 e053a5 10457->10458 10459 e032ef _free 58 API calls 10458->10459 10460 e053b0 10459->10460 10461 e032ef _free 58 API calls 10460->10461 10462 e053bb 10461->10462 10463 e032ef _free 58 API calls 10462->10463 10464 e053c6 10463->10464 10465 e032ef _free 58 API calls 10464->10465 10466 e053d1 10465->10466 10467 e032ef _free 58 API calls 10466->10467 10468 e053dc 10467->10468 10469 e032ef _free 58 API calls 10468->10469 10470 e053e7 10469->10470 10471 e032ef _free 58 API calls 10470->10471 10472 e053f2 10471->10472 10473 e032ef _free 58 API calls 10472->10473 10474 e053fd 10473->10474 10475 e032ef _free 58 API calls 10474->10475 10476 e05408 10475->10476 10477 e032ef _free 58 API calls 10476->10477 10478 e05413 10477->10478 10479 e032ef _free 58 API calls 10478->10479 10480 e0541e 10479->10480 10481 e032ef _free 58 API calls 10480->10481 10482 e05429 10481->10482 10483 e032ef _free 58 API calls 10482->10483 10484 e05434 10483->10484 10485 e032ef _free 58 API calls 10484->10485 10486 e0543f 10485->10486 10487 e032ef _free 58 API calls 10486->10487 10488 e0544d 10487->10488 10489 e032ef _free 58 API calls 10488->10489 10490 e05458 10489->10490 10491 e032ef _free 58 API calls 10490->10491 10492 e05463 10491->10492 10493 e032ef _free 58 API calls 10492->10493 10494 e0546e 10493->10494 10495 e032ef _free 58 API calls 10494->10495 10496 e05479 10495->10496 10497 e032ef _free 58 API calls 10496->10497 10498 e05484 10497->10498 10499 e032ef _free 58 API calls 10498->10499 10499->10325 10500->10253 10504 e032da LeaveCriticalSection 10501->10504 10503 e03b3d 10503->10239 10504->10503 10506 e03b4b __mtinitlocknum 10505->10506 10507 e01912 __setmbcp 58 API calls 10506->10507 10508 e03b53 10507->10508 10509 e03a99 __setmbcp 58 API calls 10508->10509 10510 e03b5d 10509->10510 10530 e0383a 10510->10530 10513 e0336f __malloc_crt 58 API calls 10514 e03b7f 10513->10514 10515 e03cac __mtinitlocknum 10514->10515 10537 e03ce7 10514->10537 10515->10200 10518 e03bb5 10520 e03bd5 10518->10520 10523 e032ef _free 58 API calls 10518->10523 10519 e03cbc 10519->10515 10521 e03ccf 10519->10521 10524 e032ef _free 58 API calls 10519->10524 10520->10515 10525 e03170 __lock 58 API calls 10520->10525 10522 e040a0 __mtinitlocknum 58 API calls 10521->10522 10522->10515 10523->10520 10524->10521 10526 e03c04 10525->10526 10527 e03c92 10526->10527 10529 e032ef _free 58 API calls 10526->10529 10547 e03cb1 10527->10547 10529->10527 10531 e03778 _LocaleUpdate::_LocaleUpdate 58 API calls 10530->10531 10532 e0384a 10531->10532 10533 e03859 GetOEMCP 10532->10533 10534 e0386b 10532->10534 10535 e03882 10533->10535 10534->10535 10536 e03870 GetACP 10534->10536 10535->10513 10535->10515 10536->10535 10538 e0383a getSystemCP 60 API calls 10537->10538 10539 e03d04 10538->10539 10542 e03d55 IsValidCodePage 10539->10542 10544 e03d0b setSBCS 10539->10544 10546 e03d7a _memset __setmbcp_nolock 10539->10546 10540 e013c0 __cftof_l 6 API calls 10541 e03ba6 10540->10541 10541->10518 10541->10519 10543 e03d67 GetCPInfo 10542->10543 10542->10544 10543->10544 10543->10546 10544->10540 10550 e03907 GetCPInfo 10546->10550 10616 e032da LeaveCriticalSection 10547->10616 10549 e03cb8 10549->10515 10551 e039e9 10550->10551 10555 e0393f 10550->10555 10554 e013c0 __cftof_l 6 API calls 10551->10554 10557 e03a95 10554->10557 10560 e057f5 10555->10560 10557->10544 10559 e05699 ___crtLCMapStringA 63 API calls 10559->10551 10561 e03778 _LocaleUpdate::_LocaleUpdate 58 API calls 10560->10561 10562 e05806 10561->10562 10570 e056fd 10562->10570 10565 e05699 10566 e03778 _LocaleUpdate::_LocaleUpdate 58 API calls 10565->10566 10567 e056aa 10566->10567 10587 e05495 10567->10587 10571 e05724 MultiByteToWideChar 10570->10571 10572 e05717 10570->10572 10573 e05750 10571->10573 10582 e05749 10571->10582 10572->10571 10576 e05772 _memset __alloca_probe_16 10573->10576 10578 e04dfb __crtGetStringTypeA_stat 58 API calls 10573->10578 10574 e013c0 __cftof_l 6 API calls 10575 e039a0 10574->10575 10575->10565 10577 e057ae MultiByteToWideChar 10576->10577 10576->10582 10579 e057d8 10577->10579 10580 e057c8 GetStringTypeW 10577->10580 10578->10576 10583 e056df 10579->10583 10580->10579 10582->10574 10584 e056e9 10583->10584 10586 e056fa 10583->10586 10585 e032ef _free 58 API calls 10584->10585 10584->10586 10585->10586 10586->10582 10589 e054ae MultiByteToWideChar 10587->10589 10590 e0550d 10589->10590 10594 e05514 10589->10594 10591 e013c0 __cftof_l 6 API calls 10590->10591 10592 e039c1 10591->10592 10592->10559 10593 e05573 MultiByteToWideChar 10595 e055da 10593->10595 10596 e0558c 10593->10596 10597 e04dfb __crtGetStringTypeA_stat 58 API calls 10594->10597 10600 e0553c __alloca_probe_16 10594->10600 10599 e056df __freea 58 API calls 10595->10599 10612 e05982 10596->10612 10597->10600 10599->10590 10600->10590 10600->10593 10601 e055a0 10601->10595 10602 e055b6 10601->10602 10604 e055e2 10601->10604 10602->10595 10603 e05982 __crtLCMapStringA_stat 2 API calls 10602->10603 10603->10595 10607 e04dfb __crtGetStringTypeA_stat 58 API calls 10604->10607 10610 e0560a __alloca_probe_16 10604->10610 10605 e05982 __crtLCMapStringA_stat 2 API calls 10606 e0564d 10605->10606 10608 e05675 10606->10608 10611 e05667 WideCharToMultiByte 10606->10611 10607->10610 10609 e056df __freea 58 API calls 10608->10609 10609->10595 10610->10595 10610->10605 10611->10608 10613 e05992 LCMapStringEx 10612->10613 10614 e059ad __crtLCMapStringA_stat 10612->10614 10613->10601 10615 e059c4 LCMapStringW 10614->10615 10615->10601 10616->10549 10618 e0495b 10617->10618 10619 e0494d 10617->10619 10620 e040a0 __mtinitlocknum 58 API calls 10618->10620 10619->10618 10624 e04971 10619->10624 10621 e04962 10620->10621 10622 e04031 __cftof_l 9 API calls 10621->10622 10623 e0496c 10622->10623 10623->9863 10624->10623 10625 e040a0 __mtinitlocknum 58 API calls 10624->10625 10625->10621 10627 e04384 EncodePointer 10626->10627 10627->10627 10628 e0439e 10627->10628 10628->9870 10632 e04270 10629->10632 10631 e04377 10631->9872 10633 e0427c __mtinitlocknum 10632->10633 10640 e01c8b 10633->10640 10639 e042a3 __mtinitlocknum 10639->10631 10641 e03170 __lock 58 API calls 10640->10641 10642 e01c92 10641->10642 10643 e042b4 DecodePointer DecodePointer 10642->10643 10644 e042e1 10643->10644 10645 e04291 10643->10645 10644->10645 10657 e058d0 10644->10657 10654 e042ae 10645->10654 10647 e04344 EncodePointer EncodePointer 10647->10645 10648 e042f3 10648->10647 10649 e04318 10648->10649 10664 e033b6 10648->10664 10649->10645 10651 e033b6 __realloc_crt 61 API calls 10649->10651 10652 e04332 EncodePointer 10649->10652 10653 e0432c 10651->10653 10652->10647 10653->10645 10653->10652 10691 e01c94 10654->10691 10658 e058d9 10657->10658 10659 e058ee HeapSize 10657->10659 10660 e040a0 __mtinitlocknum 58 API calls 10658->10660 10659->10648 10661 e058de 10660->10661 10662 e04031 __cftof_l 9 API calls 10661->10662 10663 e058e9 10662->10663 10663->10648 10666 e033bd 10664->10666 10667 e033fa 10666->10667 10669 e04e8d 10666->10669 10690 e03137 Sleep 10666->10690 10667->10649 10670 e04ea1 10669->10670 10671 e04e96 10669->10671 10673 e04ea9 10670->10673 10682 e04eb6 10670->10682 10672 e04dfb __crtGetStringTypeA_stat 58 API calls 10671->10672 10674 e04e9e 10672->10674 10675 e032ef _free 58 API calls 10673->10675 10674->10666 10687 e04eb1 __dosmaperr 10675->10687 10676 e04eee 10677 e043a0 __calloc_impl DecodePointer 10676->10677 10679 e04ef4 10677->10679 10678 e04ebe HeapReAlloc 10678->10682 10678->10687 10680 e040a0 __mtinitlocknum 58 API calls 10679->10680 10680->10687 10681 e04f1e 10684 e040a0 __mtinitlocknum 58 API calls 10681->10684 10682->10676 10682->10678 10682->10681 10683 e043a0 __calloc_impl DecodePointer 10682->10683 10686 e04f06 10682->10686 10683->10682 10685 e04f23 GetLastError 10684->10685 10685->10687 10688 e040a0 __mtinitlocknum 58 API calls 10686->10688 10687->10666 10689 e04f0b GetLastError 10688->10689 10689->10687 10690->10666 10694 e032da LeaveCriticalSection 10691->10694 10693 e01c9b 10693->10639 10694->10693 10696 e0111f 10695->10696 10697 e01186 10696->10697 10698 e01136 VirtualProtect 10696->10698 10715 e0b4e8 10697->10715 10698->10697 10699 e01156 10698->10699 10705 e175c0 10699->10705 10702 e011a7 10702->9876 10702->9879 10706 e175e2 10705->10706 10707 e1760e GetPEB 10706->10707 10708 e177c5 VirtualAlloc 10707->10708 10713 e17628 10707->10713 10710 e177ec 10708->10710 10709 e17857 LoadLibraryA 10709->10710 10710->10709 10711 e178c6 10710->10711 10718 bb4dd0 10711->10718 10713->10708 10716 e013c0 __cftof_l 6 API calls 10715->10716 10717 e0b4f2 10716->10717 10717->10717 10719 bb4de9 VirtualProtect 10718->10719 10720 bb4ded CreateThread 10718->10720 10719->10697 10720->10719 10721 bb4e0b CloseHandle 10720->10721 10722 bb4b30 Sleep 10720->10722 10721->10719 10767 bb47e0 10722->10767 10725 bb4b4a ExitProcess 10726 bb4b52 CreateThread 10727 bb4b9c 10726->10727 10728 bb4b70 WaitForSingleObject 10726->10728 11413 bb2d30 10726->11413 10783 bb48d0 CreateToolhelp32Snapshot VirtualAlloc 10727->10783 10729 bb4b92 CloseHandle 10728->10729 10730 bb4b86 TerminateThread 10728->10730 10729->10727 10730->10729 10732 bb4ba1 10794 bb42c0 10732->10794 10736 bb4bae 10737 bb4c4b 10736->10737 10738 bb4bfc VirtualAlloc 10736->10738 10743 bb4c85 10737->10743 10745 bb4c6f Sleep 10737->10745 10817 bb58d0 10737->10817 10739 bb4c19 GetModuleFileNameW 10738->10739 10740 bb4c43 ExitProcess 10738->10740 10870 bb3dc0 10739->10870 10746 bb4cf8 10743->10746 10747 bb4caf lstrlenA VirtualAlloc CryptStringToBinaryA 10743->10747 10745->10737 10881 bb4210 10746->10881 10747->10746 10749 bb4cf0 ExitProcess 10747->10749 10751 bb4d22 10890 bb4000 VirtualAlloc GetTickCount 10751->10890 10752 bb4d15 10884 bb41e0 10752->10884 10756 bb4d2a DeleteCriticalSection 10898 bb3c80 AllocateAndInitializeSid 10756->10898 10758 bb4d3a 10759 bb4d43 VirtualAlloc 10758->10759 10902 bb45c0 10758->10902 10761 bb4d8a 10759->10761 10762 bb4d60 GetModuleFileNameW 10759->10762 10763 bb4dad ExitThread 10761->10763 10764 bb4d93 ShellExecuteW 10761->10764 10765 bb3dc0 17 API calls 10762->10765 10764->10763 10766 bb4d79 VirtualFree 10765->10766 10766->10761 10909 bb3bd0 GetProcessHeap 10767->10909 10769 bb4817 10910 bb7600 10769->10910 10773 bb4829 VirtualAlloc 10774 bb4848 lstrcpyW lstrlenW 10773->10774 10993 bb7210 10774->10993 10777 bb4879 CreateMutexW GetLastError 10778 bb489a VirtualFree 10777->10778 10779 bb4891 GetLastError 10777->10779 11019 bb7ee0 10778->11019 10779->10778 10784 bb4a68 10783->10784 10789 bb4a7b 10783->10789 10785 bb4a73 Process32FirstW 10784->10785 10784->10789 10785->10789 10786 bb4a90 lstrcmpiW 10787 bb4a9f OpenProcess 10786->10787 10786->10789 10788 bb4ab1 TerminateProcess CloseHandle 10787->10788 10787->10789 10788->10789 10789->10786 10790 bb4ad4 Process32NextW 10789->10790 10790->10789 10791 bb4ae7 10790->10791 10792 bb4aeb VirtualFree 10791->10792 10793 bb4af9 CloseHandle 10791->10793 10792->10793 10793->10732 10795 bb42db 10794->10795 10796 bb45a8 10794->10796 11091 bb3bd0 GetProcessHeap 10795->11091 10814 bb6660 VirtualAlloc VirtualAlloc 10796->10814 10798 bb4306 10799 bb7600 98 API calls 10798->10799 10800 bb4312 10799->10800 10801 bb7410 16 API calls 10800->10801 10802 bb431e VirtualAlloc 10801->10802 10803 bb4342 10802->10803 10804 bb7210 49 API calls 10803->10804 10805 bb4360 10804->10805 10806 bb436c lstrlenW 10805->10806 10813 bb43a0 10806->10813 10807 bb4466 10808 bb4588 VirtualFree 10807->10808 10809 bb4557 VirtualAlloc 10807->10809 10812 bb7ee0 10 API calls 10808->10812 10809->10808 10811 bb4574 wsprintfW 10809->10811 10810 bb43f0 lstrcpyW lstrlenW 10810->10807 10810->10813 10811->10808 10812->10796 10813->10807 10813->10810 11092 bb64f0 CryptAcquireContextW 10814->11092 11100 bb8130 GetTickCount 10817->11100 10821 bb5939 10822 bb7600 98 API calls 10821->10822 10823 bb5942 10822->10823 10824 bb7410 16 API calls 10823->10824 10825 bb594b VirtualAlloc 10824->10825 10826 bb598f 10825->10826 10827 bb5e8b 10826->10827 10828 bb59fd 6 API calls 10826->10828 10830 bb5ea0 10827->10830 10831 bb5e96 VirtualFree 10827->10831 10829 bb5a7e lstrlenA 10828->10829 10834 bb5aa5 lstrlenA 10829->10834 10833 bb5ea5 VirtualFree 10830->10833 10831->10830 10835 bb7ee0 10 API calls 10833->10835 10837 bb5af2 lstrlenA 10834->10837 10842 bb5ac3 lstrlenA 10834->10842 10838 bb5ebc 10835->10838 10839 bb5b21 lstrcatW lstrlenW 10837->10839 10846 bb5afb lstrlenA 10837->10846 10838->10737 10841 bb7210 49 API calls 10839->10841 10845 bb5b4b 10841->10845 10843 bb5aee 10842->10843 10843->10837 11112 bb35c0 VirtualAlloc 10845->11112 10846->10839 10848 bb5b68 18 API calls 10850 bb5cca lstrlenW 10848->10850 10852 bb5cfb lstrlenW VirtualAlloc 10850->10852 10853 bb5ced VirtualFree 10850->10853 10854 bb5d1d wsprintfA 10852->10854 10855 bb5d30 10852->10855 10853->10852 10854->10855 11124 bb6010 VirtualAlloc 10855->11124 10858 bb5d6b GetLastError 10859 bb5d71 lstrlenA VirtualAlloc lstrlenA 10858->10859 10860 bb5d99 lstrlenA 10859->10860 10862 bb5dde lstrlenA MultiByteToWideChar 10860->10862 10866 bb5db2 lstrlenA 10860->10866 11133 bb5520 10862->11133 10866->10862 10867 bb5e1b VirtualFree VirtualFree VirtualFree 10867->10833 10868 bb5e4d VirtualFree VirtualFree VirtualFree 10868->10827 11254 bb3d00 10870->11254 10872 bb3dd6 10873 bb3fda VirtualFree 10872->10873 10874 bb3c80 4 API calls 10872->10874 10873->10740 10875 bb3de3 10874->10875 10875->10873 10876 bb3deb ExpandEnvironmentStringsW wsprintfW VirtualAlloc GetForegroundWindow 10875->10876 10877 bb3fc0 ShellExecuteExW 10876->10877 10878 bb3fe1 WaitForSingleObject CloseHandle ExitProcess 10877->10878 10879 bb3fc7 10877->10879 10879->10877 10880 bb3fcd VirtualFree 10879->10880 10880->10873 10882 bb421d VirtualAlloc 10881->10882 10883 bb4238 InitializeCriticalSection 10881->10883 10882->10883 10883->10751 10883->10752 10885 bb41f4 10884->10885 10886 bb4000 417 API calls 10885->10886 10887 bb41fc 10886->10887 11259 bb6730 VirtualFree VirtualFree 10887->11259 10889 bb4204 10889->10756 10891 bb4060 GetDriveTypeW 10890->10891 10892 bb4075 10891->10892 10892->10891 10893 bb407a CreateThread 10892->10893 10894 bb40be WaitForMultipleObjects GetTickCount 10892->10894 10893->10892 11294 bb70b0 VirtualAlloc wsprintfW InitializeCriticalSection VirtualAlloc 10893->11294 10895 bb411f 10894->10895 11260 bb56a0 10895->11260 10897 bb41cd 10897->10756 10899 bb3cba 10898->10899 10900 bb3cbe GetModuleHandleA GetProcAddress 10898->10900 10899->10758 10901 bb3ce0 FreeSid 10900->10901 10901->10758 10903 bb3d00 4 API calls 10902->10903 10904 bb45d4 VirtualAlloc 10903->10904 10906 bb478b 10904->10906 10907 bb478f GetSystemDirectoryW lstrcatW ShellExecuteW 10904->10907 10908 bb47bf VirtualFree 10906->10908 10907->10908 10908->10759 10909->10769 10911 bb7619 VirtualAlloc GetUserNameW 10910->10911 10912 bb763e 10910->10912 10911->10912 10913 bb7666 10912->10913 10914 bb7644 VirtualAlloc GetComputerNameW 10912->10914 10915 bb7672 VirtualAlloc 10913->10915 10916 bb76c6 10913->10916 10914->10913 10915->10916 10919 bb7689 10915->10919 10917 bb76d0 VirtualAlloc RegOpenKeyExW 10916->10917 10918 bb7765 10916->10918 10921 bb774e VirtualFree 10917->10921 10922 bb770c RegQueryValueExW 10917->10922 10923 bb7869 10918->10923 10924 bb776f VirtualAlloc VirtualAlloc 10918->10924 11040 bb7580 RegOpenKeyExW 10919->11040 10921->10918 10926 bb7739 GetLastError 10922->10926 10927 bb7730 10922->10927 10928 bb78cb 10923->10928 10929 bb786f VirtualAlloc 10923->10929 10930 bb77a4 wsprintfW RegOpenKeyExW 10924->10930 10925 bb76a4 10925->10916 10940 bb76c1 wsprintfW 10925->10940 10935 bb773f RegCloseKey 10926->10935 10927->10935 10933 bb793e 10928->10933 10934 bb78d1 GetNativeSystemInfo VirtualAlloc 10928->10934 10936 bb7580 5 API calls 10929->10936 10931 bb77d9 RegQueryValueExW 10930->10931 10932 bb77fb 10930->10932 10931->10932 10937 bb7804 GetLastError 10931->10937 10932->10930 10945 bb780a RegCloseKey 10932->10945 10947 bb7846 wsprintfW VirtualFree 10932->10947 10941 bb7958 10933->10941 11045 bb7ce0 VirtualAlloc VirtualAlloc 10933->11045 10938 bb7917 wsprintfW 10934->10938 10939 bb78f4 10934->10939 10935->10918 10935->10921 10942 bb789d 10936->10942 10937->10945 10938->10933 10939->10938 10946 bb7902 wsprintfW ExitProcess 10939->10946 10940->10916 10943 bb7aa9 10941->10943 10944 bb7969 VirtualAlloc VirtualAlloc GetWindowsDirectoryW GetVolumeInformationW 10941->10944 10942->10928 10952 bb7580 5 API calls 10942->10952 10955 bb7ab9 VirtualAlloc 10943->10955 10956 bb7c62 10943->10956 10950 bb7580 5 API calls 10944->10950 10945->10932 10951 bb7819 lstrcmpiW 10945->10951 10947->10923 10954 bb79f5 10950->10954 10951->10932 10951->10946 10953 bb78be wsprintfW 10952->10953 10953->10928 10959 bb7a2a wsprintfW lstrcatW GetModuleHandleW GetProcAddress 10954->10959 10960 bb79f9 lstrlenW 10954->10960 10973 bb7b10 10955->10973 10957 bb7c6b VirtualAlloc 10956->10957 10958 bb4820 10956->10958 10957->10958 10964 bb7c89 10957->10964 10975 bb7410 10958->10975 10962 bb7a84 VirtualFree 10959->10962 10963 bb7a6d lstrlenW 10959->10963 10961 bb7580 5 API calls 10960->10961 10961->10959 10962->10943 10963->10962 11063 bb7160 10964->11063 10965 bb7b32 GetDriveTypeW 10965->10973 10969 bb7b59 lstrcatW lstrcatW lstrcatW GetDiskFreeSpaceW 10971 bb7c33 lstrcatW 10969->10971 10969->10973 10970 bb7c94 VirtualFree 10970->10958 10971->10973 10972 bb7c53 lstrlenW 10972->10956 10973->10965 10973->10969 10973->10972 10974 bb7bcc lstrlenW wsprintfW lstrlenW wsprintfW lstrcatW 10973->10974 10974->10973 10976 bb7420 10975->10976 10977 bb747a 10976->10977 10978 bb745f lstrlenW lstrlenW 10976->10978 10979 bb749b 10977->10979 10980 bb7480 lstrlenW lstrlenW 10977->10980 10978->10977 10981 bb74bc 10979->10981 10982 bb74a1 lstrlenW lstrlenW 10979->10982 10980->10979 10983 bb74dd 10981->10983 10984 bb74c2 lstrlenW lstrlenW 10981->10984 10982->10981 10985 bb74fe 10983->10985 10986 bb74e3 lstrlenW lstrlenW 10983->10986 10984->10983 10987 bb751f 10985->10987 10988 bb7504 lstrlenW lstrlenW 10985->10988 10986->10985 10989 bb7549 10987->10989 10990 bb752e lstrlenW lstrlenW 10987->10990 10988->10987 10991 bb7552 lstrlenW lstrlenW 10989->10991 10992 bb7577 10989->10992 10990->10989 10991->10773 10992->10773 10994 bb722a lstrcatW lstrcatW lstrcatW lstrcatW 10993->10994 10995 bb724c 10993->10995 10994->10995 10996 bb726d 10995->10996 10997 bb7251 lstrcatW lstrcatW lstrcatW lstrcatW 10995->10997 10998 bb728f 10996->10998 10999 bb7273 lstrcatW lstrcatW lstrcatW lstrcatW 10996->10999 10997->10996 11000 bb72b1 10998->11000 11001 bb7295 lstrcatW lstrcatW lstrcatW lstrcatW 10998->11001 10999->10998 11002 bb72d3 11000->11002 11003 bb72b7 lstrcatW lstrcatW lstrcatW lstrcatW 11000->11003 11001->11000 11004 bb72d9 lstrcatW lstrcatW lstrcatW lstrcatW 11002->11004 11005 bb72f5 11002->11005 11003->11002 11004->11005 11006 bb72fb lstrcatW lstrcatW lstrcatW lstrcatW 11005->11006 11007 bb7317 11005->11007 11006->11007 11008 bb7339 11007->11008 11009 bb731d lstrcatW lstrcatW lstrcatW lstrcatW 11007->11009 11010 bb735b 11008->11010 11011 bb733f lstrcatW lstrcatW lstrcatW lstrcatW 11008->11011 11009->11008 11012 bb73cc 11010->11012 11013 bb7361 VirtualAlloc 11010->11013 11011->11010 11016 bb73ee lstrlenW 11012->11016 11017 bb73d2 lstrcatW lstrcatW lstrcatW lstrcatW 11012->11017 11014 bb737c wsprintfW 11013->11014 11015 bb7391 wsprintfW 11013->11015 11018 bb73a0 lstrcatW lstrcatW lstrcatW lstrcatW VirtualFree 11014->11018 11015->11018 11016->10777 11017->11016 11018->11012 11020 bb7efb 11019->11020 11021 bb7eef VirtualFree 11019->11021 11022 bb7f0d 11020->11022 11023 bb7f01 VirtualFree 11020->11023 11021->11020 11024 bb7f1f 11022->11024 11025 bb7f13 VirtualFree 11022->11025 11023->11022 11026 bb7f31 11024->11026 11027 bb7f25 VirtualFree 11024->11027 11025->11024 11028 bb7f43 11026->11028 11029 bb7f37 VirtualFree 11026->11029 11027->11026 11030 bb7f49 VirtualFree 11028->11030 11031 bb7f55 11028->11031 11029->11028 11030->11031 11032 bb7f5b VirtualFree 11031->11032 11033 bb7f67 11031->11033 11032->11033 11034 bb7f79 11033->11034 11035 bb7f6d VirtualFree 11033->11035 11036 bb7f8b 11034->11036 11037 bb7f7f VirtualFree 11034->11037 11035->11034 11038 bb48ba 11036->11038 11039 bb7f94 VirtualFree 11036->11039 11037->11036 11038->10725 11038->10726 11039->11038 11041 bb75ee 11040->11041 11042 bb75a2 RegQueryValueExW 11040->11042 11041->10925 11043 bb75c1 RegCloseKey 11042->11043 11044 bb75d6 GetLastError RegCloseKey 11042->11044 11043->10925 11044->10925 11046 bb7d7c CreateToolhelp32Snapshot 11045->11046 11047 bb7da2 11045->11047 11048 bb7dad Process32FirstW 11046->11048 11049 bb7d94 VirtualFree 11046->11049 11047->10941 11050 bb7e9d VirtualFree CloseHandle 11048->11050 11057 bb7dcd 11048->11057 11049->11047 11051 bb7ebd VirtualFree 11050->11051 11052 bb7ec7 11050->11052 11051->11052 11052->10941 11053 bb7e77 11054 bb7e95 11053->11054 11056 bb7e85 lstrlenW 11053->11056 11054->11050 11055 bb7de0 lstrcmpiW 11055->11057 11056->11054 11057->11053 11057->11055 11058 bb7e0a lstrcpyW lstrcatW 11057->11058 11059 bb7e1f lstrcatW lstrcatW 11057->11059 11060 bb7e57 Process32NextW 11057->11060 11061 bb7e30 lstrlenW 11058->11061 11059->11061 11060->11053 11062 bb7e68 GetLastError 11060->11062 11061->11060 11062->11053 11062->11057 11073 bb82c0 InternetOpenW 11063->11073 11067 bb71b6 11068 bb71ba lstrlenA 11067->11068 11069 bb71e1 VirtualFree 11067->11069 11068->11069 11070 bb71ca wsprintfW 11068->11070 11071 bb71fd 11069->11071 11072 bb71f6 InternetCloseHandle 11069->11072 11070->11069 11071->10958 11071->10970 11072->11071 11074 bb84ad InternetOpenW 11073->11074 11075 bb7172 VirtualAlloc lstrlenW 11073->11075 11074->11075 11076 bb84d0 11075->11076 11077 bb84e9 11076->11077 11078 bb84e2 InternetCloseHandle 11076->11078 11079 bb82c0 2 API calls 11077->11079 11078->11077 11080 bb84f0 InternetConnectW 11079->11080 11081 bb8518 11080->11081 11082 bb8521 VirtualAlloc wsprintfW HttpOpenRequestW 11080->11082 11081->11067 11083 bb8571 HttpAddRequestHeadersW 11082->11083 11084 bb8637 InternetCloseHandle InternetCloseHandle VirtualFree 11082->11084 11083->11084 11085 bb85cf HttpSendRequestW 11083->11085 11084->11067 11086 bb8631 GetLastError 11085->11086 11087 bb85e6 InternetReadFile 11085->11087 11086->11084 11087->11084 11088 bb8605 11087->11088 11088->11084 11089 bb860c InternetReadFile 11088->11089 11089->11088 11090 bb862f 11089->11090 11090->11084 11091->10798 11093 bb6548 CryptGenKey 11092->11093 11094 bb6512 GetLastError 11092->11094 11095 bb6565 CryptExportKey CryptExportKey CryptDestroyKey CryptReleaseContext CryptAcquireContextW 11093->11095 11096 bb6564 11093->11096 11097 bb651f CryptAcquireContextW 11094->11097 11098 bb6538 11094->11098 11095->11098 11096->11095 11097->11098 11099 bb653f 11097->11099 11098->10736 11099->11093 11147 bb7fb0 VirtualAlloc 11100->11147 11103 bb81cb lstrcatW 11104 bb58f6 11103->11104 11105 bb81e0 11103->11105 11111 bb3bd0 GetProcessHeap 11104->11111 11105->11104 11106 bb7fb0 2 API calls 11105->11106 11107 bb8228 lstrcatW VirtualFree 11106->11107 11108 bb7fb0 2 API calls 11107->11108 11109 bb8278 lstrcatW lstrcatW VirtualFree 11108->11109 11109->11105 11110 bb82a1 lstrcatW 11109->11110 11110->11105 11111->10821 11113 bb35f1 11112->11113 11114 bb35f7 GetModuleFileNameW CreateFileW 11112->11114 11113->10848 11115 bb369a VirtualFree 11114->11115 11116 bb3623 GetFileSize VirtualAlloc 11114->11116 11115->10848 11117 bb3693 CloseHandle 11116->11117 11118 bb3641 ReadFile 11116->11118 11117->11115 11119 bb3656 11118->11119 11120 bb3685 VirtualFree 11118->11120 11119->11120 11121 bb3667 11119->11121 11120->11117 11151 bb34f0 lstrlenA VirtualAlloc 11121->11151 11125 bb5d42 CryptBinaryToStringA 11124->11125 11126 bb6043 GetModuleHandleA 11124->11126 11125->10858 11125->10859 11127 bb6052 GetProcAddress lstrlenA 11126->11127 11128 bb6086 _memset 11126->11128 11129 bb6075 wsprintfA 11127->11129 11130 bb60a0 lstrlenA 11128->11130 11129->11128 11131 bb60b8 11130->11131 11132 bb60c8 VirtualFree 11131->11132 11132->11125 11134 bb82c0 2 API calls 11133->11134 11135 bb5539 11134->11135 11158 bb5250 VirtualAlloc 11135->11158 11138 bb557d lstrcatA lstrlenA lstrlenW lstrlenA 11140 bb84d0 15 API calls 11138->11140 11141 bb5622 11140->11141 11142 bb5657 VirtualFree VirtualFree VirtualFree 11141->11142 11167 bb5400 lstrlenA VirtualAlloc 11141->11167 11143 bb568b 11142->11143 11144 bb5684 InternetCloseHandle 11142->11144 11143->10867 11143->10868 11144->11143 11146 bb5643 11146->11142 11148 bb80aa 11147->11148 11150 bb8127 lstrlenW VirtualAlloc lstrcatW VirtualFree 11147->11150 11149 bb8114 lstrcatW 11148->11149 11148->11150 11149->11148 11149->11150 11150->11103 11150->11104 11152 bb3528 CryptStringToBinaryA 11151->11152 11153 bb35af 11151->11153 11154 bb353f VirtualAlloc VirtualAlloc 11152->11154 11155 bb35a1 VirtualFree 11152->11155 11153->11120 11156 bb3576 wsprintfW wsprintfW 11154->11156 11157 bb356f 11154->11157 11155->11153 11156->11155 11157->11156 11157->11157 11159 bb536c lstrlenA VirtualAlloc VirtualAlloc 11158->11159 11160 bb52c0 11158->11160 11159->11138 11161 bb52eb Sleep 11160->11161 11162 bb52f6 lstrlenW VirtualAlloc 11160->11162 11161->11162 11201 bb5070 CreatePipe 11162->11201 11164 bb5321 lstrcmpiA 11165 bb5349 wsprintfW VirtualFree 11164->11165 11166 bb5334 VirtualFree 11164->11166 11165->11159 11166->11160 11168 bb5433 CryptStringToBinaryA 11167->11168 11170 bb5459 11168->11170 11171 bb550c GetLastError 11168->11171 11172 bb6010 7 API calls 11170->11172 11173 bb54f3 VirtualFree 11171->11173 11174 bb5463 11172->11174 11173->11146 11223 bb33e0 11174->11223 11177 bb547d 11180 bb54c8 11177->11180 11181 bb549f lstrlenA VirtualAlloc 11177->11181 11178 bb5514 11233 bb5380 VirtualAlloc VirtualAlloc 11178->11233 11184 bb54e4 11180->11184 11187 bb54dc HeapFree 11180->11187 11181->11180 11183 bb54c0 lstrcpyA 11181->11183 11183->11180 11185 bb54f0 11184->11185 11188 bb54ed HeapFree 11184->11188 11185->11173 11187->11184 11188->11185 11202 bb51a1 SetHandleInformation 11201->11202 11203 bb5197 11201->11203 11202->11203 11204 bb51b7 CreatePipe SetHandleInformation 11202->11204 11203->11164 11204->11203 11205 bb51e0 VirtualAlloc 11204->11205 11206 bb51fa wsprintfW 11205->11206 11207 bb522f lstrcpyA 11205->11207 11212 bb4e20 11206->11212 11207->11164 11209 bb520f 11217 bb4fc0 11209->11217 11213 bb95f0 _memset 11212->11213 11214 bb4e3e CreateProcessW 11213->11214 11215 bb4e89 GetLastError 11214->11215 11216 bb4e94 CloseHandle CloseHandle 11214->11216 11215->11209 11216->11209 11218 bb4fcd 11217->11218 11219 bb4fd6 ReadFile 11218->11219 11220 bb5045 11218->11220 11219->11218 11219->11220 11221 bb5063 VirtualFree 11220->11221 11222 bb4eb0 lstrcpyA lstrlenA lstrcpyA 11220->11222 11221->11164 11222->11221 11237 bb32b0 lstrlenA 11223->11237 11226 bb34d9 ExitProcess 11228 bb3412 11228->11177 11228->11178 11230 bb3483 lstrlenA GetProcessHeap HeapAlloc 11231 bb3407 11230->11231 11232 bb34a5 lstrcpyA 11230->11232 11231->11228 11231->11230 11241 bb3190 11231->11241 11245 bb3200 11231->11245 11232->11231 11234 bb53e9 ExitProcess 11233->11234 11235 bb53b0 GetModuleFileNameW 11233->11235 11235->11234 11236 bb53c2 wsprintfW ShellExecuteW 11235->11236 11236->11234 11238 bb32cf 11237->11238 11240 bb32f8 11237->11240 11239 bb32d0 lstrlenA 11238->11239 11239->11239 11239->11240 11240->11226 11240->11231 11242 bb31b0 lstrcmpiA lstrcmpiA 11241->11242 11243 bb319e 11241->11243 11242->11231 11243->11242 11244 bb31f1 11243->11244 11244->11231 11246 bb3210 11245->11246 11247 bb323d 11246->11247 11248 bb326d 11246->11248 11249 bb3250 lstrlenA GetProcessHeap HeapAlloc 11246->11249 11247->11231 11251 bb3299 11248->11251 11252 bb3272 lstrlenA GetProcessHeap HeapAlloc 11248->11252 11250 bb328d 11249->11250 11250->11251 11253 bb3291 lstrcpyA 11250->11253 11251->11231 11252->11250 11253->11251 11257 bb95f0 11254->11257 11256 bb3d57 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 11256->10872 11258 bb95fc 11257->11258 11258->11256 11258->11258 11259->10889 11261 bb8130 14 API calls 11260->11261 11262 bb56be VirtualAlloc 11261->11262 11264 bb56f1 wsprintfW 11262->11264 11293 bb3bd0 GetProcessHeap 11264->11293 11267 bb5746 11268 bb7600 98 API calls 11267->11268 11269 bb5751 11268->11269 11270 bb7410 16 API calls 11269->11270 11271 bb575c lstrlenW 11270->11271 11272 bb7210 49 API calls 11271->11272 11273 bb5772 lstrlenW 11272->11273 11274 bb5788 VirtualFree 11273->11274 11275 bb5796 lstrlenW VirtualAlloc 11273->11275 11274->11275 11276 bb57c5 11275->11276 11277 bb57b5 wsprintfA 11275->11277 11278 bb6010 7 API calls 11276->11278 11277->11276 11279 bb57d5 CryptBinaryToStringA 11278->11279 11280 bb57fa GetLastError 11279->11280 11281 bb5800 lstrlenA VirtualAlloc lstrlenA 11279->11281 11280->11281 11282 bb582f lstrlenA 11281->11282 11286 bb584b lstrlenA 11282->11286 11288 bb586a 11282->11288 11284 bb5520 100 API calls 11287 bb587a 11284->11287 11286->11288 11289 bb5898 VirtualFree 11287->11289 11290 bb58a2 VirtualFree 11287->11290 11288->11284 11289->11290 11291 bb7ee0 10 API calls 11290->11291 11292 bb58b9 VirtualFree 11291->11292 11292->10897 11293->11267 11297 bb6f00 11294->11297 11296 bb7142 VirtualFree ExitThread 11298 bb6f1e 11297->11298 11299 bb6f30 11297->11299 11319 bb68a0 VirtualAlloc 11298->11319 11304 bb6f34 11299->11304 11345 bb6e50 VirtualAlloc wsprintfW CreateFileW 11299->11345 11301 bb6f26 11301->11299 11330 bb6cb0 lstrlenW lstrcatW FindFirstFileW 11301->11330 11303 bb6f5f lstrlenW lstrcatW FindFirstFileW 11305 bb6fa1 11303->11305 11306 bb6f95 11303->11306 11304->11296 11307 bb6fa4 lstrcmpW 11305->11307 11306->11296 11309 bb6fbe lstrcmpW 11307->11309 11310 bb7083 FindNextFileW 11307->11310 11309->11310 11311 bb6fd8 lstrcatW 11309->11311 11310->11307 11312 bb709b FindClose 11310->11312 11316 bb6feb 11311->11316 11312->11296 11313 bb7021 lstrcatW 11315 bb6f00 104 API calls 11313->11315 11315->11316 11316->11310 11316->11313 11317 bb7001 lstrcatW 11316->11317 11351 bb6bc0 VirtualAlloc wsprintfW 11316->11351 11318 bb6f00 104 API calls 11317->11318 11318->11316 11321 bb68d0 11319->11321 11320 bb690c VirtualFree 11320->11301 11322 bb6973 SHGetSpecialFolderPathW 11321->11322 11329 bb6904 11321->11329 11323 bb699f SHGetSpecialFolderPathW 11322->11323 11324 bb6984 11322->11324 11325 bb69bd SHGetSpecialFolderPathW 11323->11325 11326 bb69ac 11323->11326 11324->11323 11324->11329 11327 bb69db SHGetSpecialFolderPathW 11325->11327 11328 bb69ca 11325->11328 11326->11325 11326->11329 11327->11329 11328->11327 11328->11329 11329->11320 11331 bb6d00 lstrcmpW 11330->11331 11332 bb6e22 FindNextFileW 11331->11332 11333 bb6d16 lstrcmpW 11331->11333 11332->11331 11335 bb6e3a FindClose 11332->11335 11333->11332 11334 bb6d2c lstrcatW lstrlenW 11333->11334 11336 bb6d4f 11334->11336 11335->11299 11336->11332 11337 bb6d64 lstrcmpW 11336->11337 11339 bb6e02 CloseHandle 11336->11339 11342 bb6df1 VirtualFree 11336->11342 11343 bb6dd9 lstrlenA 11336->11343 11337->11336 11338 bb6d74 CreateFileW GetFileSize 11337->11338 11338->11339 11340 bb6da1 VirtualAlloc 11338->11340 11339->11335 11339->11336 11340->11336 11341 bb6db6 ReadFile 11340->11341 11341->11336 11341->11342 11342->11336 11359 bb6c50 lstrlenA 11343->11359 11346 bb6eae 11345->11346 11347 bb6e9c GetLastError 11345->11347 11349 bb6eb7 lstrlenW WriteFile 11346->11349 11350 bb6ed4 CloseHandle 11346->11350 11348 bb6ee0 VirtualFree 11347->11348 11348->11303 11349->11350 11350->11348 11361 bb6ad0 11351->11361 11353 bb6bfa 11358 bb6c17 VirtualFree 11353->11358 11369 bb6a10 lstrlenW lstrlenW 11353->11369 11356 bb6c13 11356->11358 11381 bb37b0 GetFileAttributesW SetFileAttributesW 11356->11381 11358->11316 11360 bb6c6a 11359->11360 11360->11336 11362 bb6aea lstrlenW 11361->11362 11363 bb6ae0 11361->11363 11364 bb6afe 11362->11364 11365 bb6b10 11362->11365 11363->11353 11364->11365 11366 bb6b18 lstrlenW VirtualAlloc wsprintfW 11364->11366 11365->11353 11367 bb6b55 VirtualFree 11366->11367 11367->11353 11370 bb6a3e lstrcmpiW 11369->11370 11371 bb6a2c 11369->11371 11372 bb6a5c lstrcmpiW 11370->11372 11373 bb6a53 11370->11373 11371->11370 11372->11373 11374 bb6a68 lstrcmpiW 11372->11374 11373->11356 11374->11373 11375 bb6a74 lstrcmpiW 11374->11375 11375->11373 11376 bb6a80 lstrcmpiW 11375->11376 11376->11373 11377 bb6a8c lstrcmpiW 11376->11377 11377->11373 11378 bb6a98 lstrcmpiW 11377->11378 11378->11373 11379 bb6aa4 lstrcmpiW 11378->11379 11379->11373 11380 bb6ab0 lstrcmpiW 11379->11380 11380->11356 11382 bb6610 11381->11382 11383 bb37f6 VirtualAlloc lstrcpyW lstrcatW 11382->11383 11384 bb8880 9 API calls 11383->11384 11385 bb3875 11384->11385 11386 bb8880 9 API calls 11385->11386 11387 bb3885 VirtualAlloc VirtualAlloc 11386->11387 11388 bb6770 12 API calls 11387->11388 11389 bb38f4 11388->11389 11390 bb3901 MessageBoxA 11389->11390 11391 bb3917 11389->11391 11392 bb3985 VirtualFree VirtualFree 11390->11392 11393 bb6770 12 API calls 11391->11393 11394 bb3bae VirtualFree 11392->11394 11395 bb392c 11393->11395 11394->11358 11396 bb394c 11395->11396 11397 bb3933 GetLastError 11395->11397 11398 bb395f CreateFileW 11396->11398 11397->11394 11398->11392 11399 bb39ae VirtualAlloc VirtualAlloc 11398->11399 11400 bb39f3 ReadFile 11399->11400 11401 bb3b19 VirtualFree 11400->11401 11411 bb39f0 _memmove 11400->11411 11402 bb3b68 CloseHandle VirtualFree VirtualFree VirtualFree 11401->11402 11403 bb3b2e WriteFile WriteFile WriteFile 11401->11403 11405 bb3bab 11402->11405 11406 bb3b9f MoveFileW 11402->11406 11403->11402 11404 bb3a58 VirtualAlloc 11404->11411 11405->11394 11406->11405 11407 bb3a77 VirtualAlloc 11408 bb3ab2 VirtualFree SetFilePointerEx 11407->11408 11407->11411 11409 bb3ade GetLastError 11408->11409 11410 bb3ae4 WriteFile 11408->11410 11409->11410 11410->11411 11412 bb3b05 VirtualFree 11410->11412 11411->11400 11411->11401 11411->11404 11411->11407 11411->11408 11411->11412 11412->11401 11412->11411 11434 bb2f50 K32EnumDeviceDrivers 11413->11434 11415 bb2d8c 11416 bb2de9 GetModuleHandleW LoadCursorW LoadIconW RegisterClassExW 11415->11416 11419 bb2f50 7 API calls 11415->11419 11417 bb2e7b GetModuleHandleW GetModuleHandleW CreateWindowExW SetWindowLongW 11416->11417 11418 bb2e75 ExitThread 11416->11418 11420 bb2ebe ExitThread 11417->11420 11421 bb2ec5 ShowWindow UpdateWindow CreateThread 11417->11421 11422 bb2d99 11419->11422 11423 bb2eed CloseHandle 11421->11423 11424 bb2ef4 GetMessageW 11421->11424 11524 bb2d10 SendMessageW ExitThread 11421->11524 11422->11416 11427 bb2f50 7 API calls 11422->11427 11423->11424 11425 bb2f0b 11424->11425 11426 bb2f3d ExitThread 11424->11426 11428 bb2f17 TranslateMessage DispatchMessageW 11425->11428 11429 bb2dce 11427->11429 11428->11426 11430 bb2f2c GetMessageW 11428->11430 11429->11426 11444 bb30a0 11429->11444 11430->11426 11430->11428 11435 bb2f7d 11434->11435 11436 bb2f82 VirtualAlloc 11434->11436 11435->11415 11437 bb2f99 11436->11437 11438 bb2f9f K32EnumDeviceDrivers 11436->11438 11437->11415 11439 bb2ff2 VirtualFree 11438->11439 11442 bb2fae 11438->11442 11439->11415 11440 bb2fc0 K32GetDeviceDriverBaseNameW 11441 bb2fd9 lstrcmpiW 11440->11441 11440->11442 11441->11442 11443 bb3009 VirtualFree 11441->11443 11442->11439 11442->11440 11443->11415 11445 bb2f50 7 API calls 11444->11445 11446 bb3151 11445->11446 11447 bb2f50 7 API calls 11446->11447 11452 bb2ddb 11446->11452 11448 bb3160 11447->11448 11449 bb2f50 7 API calls 11448->11449 11448->11452 11450 bb316c 11449->11450 11451 bb2f50 7 API calls 11450->11451 11450->11452 11451->11452 11452->11426 11453 bb2ad0 VirtualAlloc 11452->11453 11454 bb2b02 GetModuleFileNameW GetTempPathW 11453->11454 11456 bb2b48 11454->11456 11457 bb2b4c 11456->11457 11458 bb2b53 lstrlenW 11456->11458 11497 bb2960 lstrlenW 11457->11497 11468 bb8730 CryptAcquireContextW 11458->11468 11460 bb2b8e GetEnvironmentVariableW 11462 bb2bac 11460->11462 11464 bb2bd8 lstrcatW lstrcatW lstrcatW 11462->11464 11467 bb2bb0 11462->11467 11463 bb2c45 ExitThread 11480 bb2890 CreateFileW 11464->11480 11466 bb2c2f wsprintfW 11466->11457 11467->11463 11467->11466 11469 bb875b VirtualAlloc 11468->11469 11470 bb8849 11468->11470 11472 bb878b 11469->11472 11473 bb8852 CryptReleaseContext VirtualFree 11469->11473 11470->11460 11472->11473 11474 bb8793 GetModuleHandleA 11472->11474 11473->11460 11475 bb87d9 LoadLibraryA 11474->11475 11476 bb87e7 GetProcAddress 11474->11476 11475->11476 11477 bb882e 11475->11477 11476->11477 11478 bb87f6 11476->11478 11479 bb8830 CryptReleaseContext VirtualFree 11477->11479 11478->11477 11478->11479 11479->11470 11481 bb28f9 11480->11481 11482 bb28b8 GetFileSize 11480->11482 11481->11467 11502 bb3030 11482->11502 11485 bb3030 7 API calls 11486 bb28d5 CreateFileMappingW 11485->11486 11487 bb2902 MapViewOfFile 11486->11487 11488 bb28f2 CloseHandle 11486->11488 11489 bb2948 CloseHandle CloseHandle 11487->11489 11490 bb2916 11487->11490 11488->11481 11489->11467 11491 bb3030 7 API calls 11490->11491 11492 bb291b 11491->11492 11493 bb292b 11492->11493 11507 bb8880 CryptAcquireContextW 11492->11507 11518 bb2830 CreateFileW 11493->11518 11498 bb8730 9 API calls 11497->11498 11499 bb29ad RegCreateKeyExW 11498->11499 11500 bb2a8e lstrlenW RegSetValueExW RegCloseKey 11499->11500 11501 bb2ac0 11499->11501 11500->11463 11501->11463 11503 bb2f50 7 API calls 11502->11503 11504 bb307f 11503->11504 11505 bb28c8 11504->11505 11506 bb2f50 7 API calls 11504->11506 11505->11485 11506->11505 11508 bb88ae VirtualAlloc 11507->11508 11509 bb8972 11507->11509 11511 bb897b CryptReleaseContext VirtualFree 11508->11511 11512 bb88d8 11508->11512 11509->11493 11511->11493 11512->11511 11513 bb88e1 GetModuleHandleA 11512->11513 11514 bb8927 LoadLibraryA 11513->11514 11515 bb8935 GetProcAddress 11513->11515 11514->11515 11516 bb8959 CryptReleaseContext VirtualFree 11514->11516 11515->11516 11517 bb8944 11515->11517 11516->11509 11517->11516 11519 bb285b 11518->11519 11520 bb287f UnmapViewOfFile 11518->11520 11521 bb285f WriteFile 11519->11521 11522 bb2873 11519->11522 11520->11489 11521->11522 11523 bb2878 CloseHandle 11521->11523 11522->11523 11523->11520 11528 e01c9d 11525->11528 11527 e01b44 11529 e01ca9 __mtinitlocknum 11528->11529 11530 e03170 __lock 51 API calls 11529->11530 11531 e01cb0 11530->11531 11532 e01cde DecodePointer 11531->11532 11537 e01d69 __cinit 11531->11537 11534 e01cf5 DecodePointer 11532->11534 11532->11537 11541 e01d05 11534->11541 11535 e01dc6 __mtinitlocknum 11535->11527 11548 e01db7 11537->11548 11539 e01d12 EncodePointer 11539->11541 11540 e01dae 11542 e01b13 __mtinitlocknum 3 API calls 11540->11542 11541->11537 11541->11539 11543 e01d22 DecodePointer EncodePointer 11541->11543 11544 e01db7 11542->11544 11546 e01d34 DecodePointer DecodePointer 11543->11546 11545 e01dc4 11544->11545 11553 e032da LeaveCriticalSection 11544->11553 11545->11527 11546->11541 11549 e01d97 11548->11549 11550 e01dbd 11548->11550 11549->11535 11552 e032da LeaveCriticalSection 11549->11552 11554 e032da LeaveCriticalSection 11550->11554 11552->11540 11553->11545 11554->11549 12281 bb81e6 12282 bb81f0 12281->12282 12283 bb7fb0 2 API calls 12282->12283 12288 bb82b7 12282->12288 12284 bb8228 lstrcatW VirtualFree 12283->12284 12285 bb7fb0 2 API calls 12284->12285 12286 bb8278 lstrcatW lstrcatW VirtualFree 12285->12286 12286->12282 12287 bb82a1 lstrcatW 12286->12287 12287->12282

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 bb7600-bb7617 1 bb7619-bb7638 VirtualAlloc GetUserNameW 0->1 2 bb763e-bb7642 0->2 1->2 3 bb7666-bb7670 2->3 4 bb7644-bb7660 VirtualAlloc GetComputerNameW 2->4 5 bb7672-bb7687 VirtualAlloc 3->5 6 bb76c6-bb76ca 3->6 4->3 5->6 9 bb7689-bb769f call bb7580 5->9 7 bb76d0-bb770a VirtualAlloc RegOpenKeyExW 6->7 8 bb7765-bb7769 6->8 11 bb774e-bb775f VirtualFree 7->11 12 bb770c-bb772e RegQueryValueExW 7->12 13 bb7869-bb786d 8->13 14 bb776f-bb779d VirtualAlloc * 2 8->14 15 bb76a4-bb76a6 9->15 11->8 16 bb7739 GetLastError 12->16 17 bb7730-bb7737 12->17 18 bb78cb-bb78cf 13->18 19 bb786f-bb7898 VirtualAlloc call bb7580 13->19 20 bb77a4-bb77d7 wsprintfW RegOpenKeyExW 14->20 23 bb76b9-bb76be 15->23 24 bb76a8-bb76af 15->24 27 bb773f-bb774c RegCloseKey 16->27 17->27 25 bb793e-bb7942 18->25 26 bb78d1-bb78f2 GetNativeSystemInfo VirtualAlloc 18->26 38 bb789d-bb789f 19->38 21 bb77d9-bb77f9 RegQueryValueExW 20->21 22 bb7834-bb7836 20->22 29 bb77fb-bb7802 21->29 30 bb7804 GetLastError 21->30 35 bb7839-bb783c 22->35 34 bb76c1-bb76c3 wsprintfW 23->34 24->6 31 bb76b1-bb76b7 24->31 36 bb795f-bb7963 25->36 37 bb7944-bb7953 call bb7ce0 25->37 32 bb7933 26->32 33 bb78f4-bb78fb 26->33 27->8 27->11 41 bb780a-bb7817 RegCloseKey 29->41 30->41 31->34 49 bb7938-bb793b wsprintfW 32->49 33->32 42 bb791e-bb7923 33->42 43 bb792c-bb7931 33->43 44 bb7902-bb7911 wsprintfW ExitProcess 33->44 45 bb7917-bb791c 33->45 46 bb7925-bb792a 33->46 34->6 47 bb783e-bb7840 35->47 48 bb7846-bb7863 wsprintfW VirtualFree 35->48 39 bb7aa9 36->39 40 bb7969-bb79f7 VirtualAlloc * 2 GetWindowsDirectoryW GetVolumeInformationW call bb7580 36->40 52 bb7958-bb795a 37->52 38->18 51 bb78a1-bb78c8 call bb7580 wsprintfW 38->51 55 bb7aaf-bb7ab3 39->55 65 bb7a2a-bb7a6b wsprintfW lstrcatW GetModuleHandleW GetProcAddress 40->65 66 bb79f9-bb7a25 lstrlenW call bb7580 40->66 41->22 54 bb7819-bb7829 lstrcmpiW 41->54 42->49 43->49 45->49 46->49 47->20 47->48 48->13 49->25 51->18 52->36 62 bb795c 52->62 54->44 59 bb782f-bb7832 54->59 60 bb7ab9-bb7b09 VirtualAlloc 55->60 61 bb7c62-bb7c69 55->61 59->35 67 bb7b10-bb7b1b 60->67 63 bb7c6b-bb7c87 VirtualAlloc 61->63 64 bb7cb0-bb7cbb 61->64 62->36 72 bb7c89-bb7c92 call bb7160 63->72 73 bb7ca6 63->73 70 bb7a89 65->70 71 bb7a6d-bb7a87 lstrlenW 65->71 66->65 67->67 68 bb7b1d-bb7b2f 67->68 74 bb7b32-bb7b4a GetDriveTypeW 68->74 76 bb7a90-bb7aa7 VirtualFree 70->76 71->76 72->64 83 bb7c94-bb7ca0 VirtualFree 72->83 73->64 78 bb7c3d 74->78 79 bb7b50-bb7b53 74->79 76->55 82 bb7c43-bb7c4d 78->82 79->78 81 bb7b59-bb7ba0 lstrcatW * 3 GetDiskFreeSpaceW 79->81 84 bb7c33-bb7c3b lstrcatW 81->84 85 bb7ba6-bb7c31 call bb8f30 * 2 lstrlenW wsprintfW lstrlenW wsprintfW lstrcatW 81->85 82->74 86 bb7c53-bb7c5d lstrlenW 82->86 83->73 84->78 85->82 86->61
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00BB7627
                                                      • GetUserNameW.ADVAPI32(00000000,?), ref: 00BB7638
                                                      • VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00BB7656
                                                      • GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00BB7660
                                                      • VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00BB7680
                                                      • wsprintfW.USER32 ref: 00BB76C1
                                                      • VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00BB76DE
                                                      • RegOpenKeyExW.KERNEL32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00BB7702
                                                      • RegQueryValueExW.KERNEL32(00000000,LocaleName,00000000,00000000,00BB4820,?), ref: 00BB7726
                                                      • GetLastError.KERNEL32 ref: 00BB7739
                                                      • RegCloseKey.KERNEL32(00000000), ref: 00BB7742
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB775F
                                                      • VirtualAlloc.KERNEL32(00000000,0000008A,00003000,00000004), ref: 00BB777D
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00BB7793
                                                      • wsprintfW.USER32 ref: 00BB77AD
                                                      • RegOpenKeyExW.KERNEL32(80000001,Keyboard Layout\Preload,00000000,00020019,?), ref: 00BB77CF
                                                      • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000000,00BB4820,?), ref: 00BB77F1
                                                      • GetLastError.KERNEL32 ref: 00BB7804
                                                      • RegCloseKey.KERNEL32(?), ref: 00BB780D
                                                      • lstrcmpiW.KERNEL32(00BB4820,00000419), ref: 00BB7821
                                                      • wsprintfW.USER32 ref: 00BB784E
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB785D
                                                      • VirtualAlloc.KERNEL32(00000000,00000082,00003000,00000004), ref: 00BB787D
                                                      • wsprintfW.USER32 ref: 00BB78C6
                                                      • GetNativeSystemInfo.KERNEL32(?), ref: 00BB78D5
                                                      • VirtualAlloc.KERNEL32(00000000,00000040,00003000,00000004), ref: 00BB78E6
                                                      • wsprintfW.USER32 ref: 00BB790A
                                                      • ExitProcess.KERNEL32 ref: 00BB7911
                                                      • wsprintfW.USER32 ref: 00BB7939
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004), ref: 00BB7977
                                                      • VirtualAlloc.KERNEL32(00000000,00000E0C,00003000,00000004), ref: 00BB798A
                                                      • GetWindowsDirectoryW.KERNEL32(00000000,00000100), ref: 00BB7994
                                                      • GetVolumeInformationW.KERNEL32(00000000,00000200,00000100,00000600,00000608,00000604,00000400,00000100), ref: 00BB79CE
                                                      • lstrlenW.KERNEL32(0000060C,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00BB7A00
                                                      • wsprintfW.USER32 ref: 00BB7A38
                                                      • lstrcatW.KERNEL32(?,0000060C), ref: 00BB7A4D
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlComputeCrc32), ref: 00BB7A59
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00BB7A60
                                                      • lstrlenW.KERNEL32(?), ref: 00BB7A70
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB7AA1
                                                        • Part of subcall function 00BB7CE0: VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,756EF3C0,?,760773E0), ref: 00BB7CFD
                                                        • Part of subcall function 00BB7CE0: VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00BB7D71
                                                        • Part of subcall function 00BB7CE0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00BB7D86
                                                        • Part of subcall function 00BB7CE0: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB7D9C
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004), ref: 00BB7AF8
                                                      • GetDriveTypeW.KERNEL32(?), ref: 00BB7B3F
                                                      • lstrcatW.KERNEL32(?,?), ref: 00BB7B66
                                                      • lstrcatW.KERNEL32(?,00BC0334), ref: 00BB7B78
                                                      • lstrcatW.KERNEL32(?,00BC03A8), ref: 00BB7B82
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,00BB4820,?,00000000), ref: 00BB7B98
                                                      • lstrlenW.KERNEL32(?,?,00000000,00BB4820,00000000,00000000,00000000,00BB4820,00000000), ref: 00BB7BE0
                                                      • wsprintfW.USER32 ref: 00BB7BFA
                                                      • lstrlenW.KERNEL32(?), ref: 00BB7C08
                                                      • wsprintfW.USER32 ref: 00BB7C1C
                                                      • lstrcatW.KERNEL32(?,00BC03C8), ref: 00BB7C2F
                                                      • lstrcatW.KERNEL32(?,00BC03CC), ref: 00BB7C3B
                                                      • lstrlenW.KERNEL32(?), ref: 00BB7C56
                                                      • VirtualAlloc.KERNEL32(00000000,00000081,00003000,00000004), ref: 00BB7C79
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,00000000), ref: 00BB7CA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$wsprintf$Freelstrcat$lstrlen$CloseErrorLastNameOpenQueryValue$AddressComputerCreateDirectoryDiskDriveExitHandleInfoInformationModuleNativeProcProcessSnapshotSpaceSystemToolhelp32TypeUserVolumeWindowslstrcmpi
                                                      • String ID: %I64u$%I64u/$00000419$?:\$@$ARM$CDROM$Control Panel\International$Domain$FIXED$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Identifier$Itanium$Keyboard Layout\Preload$LocaleName$NO_ROOT_DIR$ProcessorNameString$RAMDISK$REMOTE$REMOVABLE$RtlComputeCrc32$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion$SYSTEM\CurrentControlSet\services\Tcpip\Parameters$UNKNOWN$Unknown$WORKGROUP$error$ntdll.dll$productName$undefined$x64$x86
                                                      • API String ID: 153366582-3109846240
                                                      • Opcode ID: d534b7af877341accf3e86b10ec871d2e698a59e67cccfc87aad769e9d49aee1
                                                      • Instruction ID: 27935ce747341caf4aa181062d26cc16d58936c43269191120a550ac0aa21852
                                                      • Opcode Fuzzy Hash: d534b7af877341accf3e86b10ec871d2e698a59e67cccfc87aad769e9d49aee1
                                                      • Instruction Fuzzy Hash: 79126C70A80305FFEB21ABA4CC4AFAABBF9FB44700F100559F645B61A0DBF1A944CB55

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 91 bb58d0-bb58fc call bb8130 94 bb590e-bb598d call bb3bd0 call bb7600 call bb7410 VirtualAlloc 91->94 95 bb58fe-bb5906 91->95 102 bb598f-bb5991 94->102 103 bb59a2 94->103 95->94 102->103 105 bb5993-bb59a0 102->105 104 bb59a6-bb59b2 103->104 106 bb59d1-bb59d3 104->106 107 bb59b4-bb59bd 104->107 105->104 109 bb59d7-bb59dd 106->109 107->106 108 bb59bf-bb59cf 107->108 108->109 110 bb59e9-bb59eb 109->110 111 bb59df-bb59e7 109->111 112 bb59ef-bb59f7 110->112 111->110 111->112 113 bb5e8b 112->113 114 bb59fd-bb5a7c CryptBinaryToStringA * 2 lstrlenA * 2 VirtualAlloc lstrlenA 112->114 115 bb5e8f-bb5e94 113->115 116 bb5a7e-bb5a82 114->116 117 bb5a95 114->117 118 bb5ea0 115->118 119 bb5e96-bb5e9e VirtualFree 115->119 116->117 120 bb5a84-bb5a93 116->120 121 bb5a9d-bb5aa3 lstrlenA 117->121 122 bb5ea5-bb5ec4 VirtualFree call bb7ee0 118->122 119->118 120->121 123 bb5aaf 121->123 124 bb5aa5-bb5aad 121->124 126 bb5ab7-bb5ac1 lstrlenA 123->126 124->123 124->126 127 bb5ac3-bb5acf 126->127 128 bb5af2-bb5af9 lstrlenA 126->128 130 bb5ad0-bb5ad5 127->130 131 bb5afb-bb5aff 128->131 132 bb5b21-bb5b6a lstrcatW lstrlenW call bb7210 call bb35c0 128->132 133 bb5ae2-bb5aec lstrlenA 130->133 134 bb5ad7-bb5ad9 130->134 135 bb5b03-bb5b08 131->135 145 bb5b7e-bb5b8a 132->145 146 bb5b6c-bb5b7c 132->146 133->130 138 bb5aee 133->138 134->133 137 bb5adb-bb5ade 134->137 139 bb5b0a-bb5b0c 135->139 140 bb5b15-bb5b1f lstrlenA 135->140 137->133 138->128 139->140 142 bb5b0e-bb5b11 139->142 140->132 140->135 142->140 147 bb5b8e-bb5cc8 lstrcatW * 4 VirtualFree * 2 lstrcatW lstrlenW lstrlenA MultiByteToWideChar lstrcatW lstrlenW lstrlenA MultiByteToWideChar lstrcatW lstrlenW VirtualAlloc lstrlenW 145->147 146->147 148 bb5cca-bb5cce 147->148 149 bb5cd4 147->149 148->149 150 bb5cd0-bb5cd2 148->150 151 bb5cd6-bb5ceb lstrlenW 149->151 150->151 152 bb5cfb-bb5d1b lstrlenW VirtualAlloc 151->152 153 bb5ced-bb5cf5 VirtualFree 151->153 154 bb5d1d-bb5d2d wsprintfA 152->154 155 bb5d30-bb5d69 call bb6010 CryptBinaryToStringA 152->155 153->152 154->155 158 bb5d6b GetLastError 155->158 159 bb5d71-bb5d97 lstrlenA VirtualAlloc lstrlenA 155->159 158->159 160 bb5d99-bb5d9f 159->160 161 bb5da1 159->161 160->161 162 bb5da9-bb5db0 lstrlenA 160->162 161->162 163 bb5dde-bb5e0f lstrlenA MultiByteToWideChar call bb5520 162->163 164 bb5db2-bb5dba 162->164 169 bb5e14-bb5e19 163->169 165 bb5dc0-bb5dc5 164->165 167 bb5dd2-bb5ddc lstrlenA 165->167 168 bb5dc7-bb5dc9 165->168 167->163 167->165 168->167 170 bb5dcb-bb5dce 168->170 171 bb5e1b-bb5e4b VirtualFree * 3 169->171 172 bb5e4d-bb5e53 169->172 170->167 171->122 173 bb5e5a-bb5e89 VirtualFree * 3 172->173 174 bb5e55-bb5e58 172->174 173->115 174->173
                                                      APIs
                                                        • Part of subcall function 00BB8130: GetTickCount.KERNEL32 ref: 00BB8139
                                                        • Part of subcall function 00BB8130: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00BB818F
                                                        • Part of subcall function 00BB8130: VirtualAlloc.KERNEL32(00000000,00000000), ref: 00BB81A1
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00000000), ref: 00BB81B1
                                                        • Part of subcall function 00BB8130: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB81BB
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00BC0604), ref: 00BB81D1
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00000000), ref: 00BB822C
                                                        • Part of subcall function 00BB8130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB823A
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00BBFFF8), ref: 00BB8280
                                                      • VirtualAlloc.KERNEL32(00000000,00000008,00003000,00000040,00000001,?,00000001,00000001,?,00000001), ref: 00BB5969
                                                      • CryptBinaryToStringA.CRYPT32(00000000,00000000,40000001,00000000,?,?,00000001,00000001,?,00000001), ref: 00BB5A1C
                                                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,00000001,00000001,?,00000001), ref: 00BB5A35
                                                      • lstrlenA.KERNEL32(00000000,?,00000001,00000001,?,00000001), ref: 00BB5A3E
                                                      • lstrlenA.KERNEL32(?,?,00000001,00000001,?,00000001), ref: 00BB5A46
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000040,?,00000001,00000001,?,00000001), ref: 00BB5A5B
                                                      • lstrlenA.KERNEL32 ref: 00BB5A77
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5A9E
                                                      • lstrlenA.KERNEL32(?), ref: 00BB5ABD
                                                      • lstrlenA.KERNEL32(?), ref: 00BB5AE4
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5AF5
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5B17
                                                      • lstrcatW.KERNEL32(?,action=call&), ref: 00BB5B2B
                                                      • lstrlenW.KERNEL32(?), ref: 00BB5B38
                                                      • lstrcatW.KERNEL32(756EE0B0,&id=,756EE0B0), ref: 00BB5B9A
                                                      • lstrcatW.KERNEL32(756EE0B0,?), ref: 00BB5BA1
                                                      • lstrcatW.KERNEL32(756EE0B0,&subid=), ref: 00BB5BA9
                                                      • lstrcatW.KERNEL32(756EE0B0,?), ref: 00BB5BB0
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB5BC3
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00BB5BD0
                                                      • lstrcatW.KERNEL32(756EE0B0,&pub_key=), ref: 00BB5BD8
                                                      • lstrlenW.KERNEL32(756EE0B0), ref: 00BB5BE5
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5BEE
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,756EE0B0,00000000), ref: 00BB5BFF
                                                      • lstrcatW.KERNEL32(?,&priv_key=), ref: 00BB5C0F
                                                      • lstrlenW.KERNEL32(?), ref: 00BB5C16
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5C1F
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000), ref: 00BB5C30
                                                      • lstrcatW.KERNEL32(00BBFCB0,00760026), ref: 00BB5C8D
                                                      • lstrlenW.KERNEL32(?), ref: 00BB5C98
                                                      • VirtualAlloc.KERNEL32(00000000,-00000012,00003000,00000040), ref: 00BB5CAE
                                                      • lstrlenW.KERNEL32(?), ref: 00BB5CB9
                                                      • lstrlenW.KERNEL32(?), ref: 00BB5CDD
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB5CF5
                                                      • lstrlenW.KERNEL32(?,00003000,00000004), ref: 00BB5D06
                                                      • VirtualAlloc.KERNEL32(00000000,-00000002), ref: 00BB5D0E
                                                      • wsprintfA.USER32 ref: 00BB5D27
                                                        • Part of subcall function 00BB6010: VirtualAlloc.KERNEL32(00000000,0000000A,00003000,00000004,00000000,00000000), ref: 00BB6033
                                                        • Part of subcall function 00BB6010: GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00BB6048
                                                        • Part of subcall function 00BB6010: GetProcAddress.KERNEL32(00000000,RtlComputeCrc32), ref: 00BB6059
                                                        • Part of subcall function 00BB6010: lstrlenA.KERNEL32(00000000), ref: 00BB6064
                                                        • Part of subcall function 00BB6010: wsprintfA.USER32 ref: 00BB607C
                                                        • Part of subcall function 00BB6010: _memset.LIBCMT ref: 00BB609B
                                                        • Part of subcall function 00BB6010: lstrlenA.KERNEL32(00000000), ref: 00BB60A4
                                                        • Part of subcall function 00BB6010: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB60D3
                                                      • CryptBinaryToStringA.CRYPT32(?,756EE0B0,40000001,00000000,?), ref: 00BB5D61
                                                      • GetLastError.KERNEL32(?,00000001,00000001,?,00000001), ref: 00BB5D6B
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5D72
                                                      • VirtualAlloc.KERNEL32(00000000,00000002,00003000,00000040), ref: 00BB5D81
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5D8C
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5DAC
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5DD4
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB5DE3
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000), ref: 00BB5DF4
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00BB5E2C
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00BB5E3A
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00BB5E47
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00BB5E6C
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00BB5E7A
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00BB5E87
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB5E9E
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB5EB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Virtual$Free$lstrcat$Alloc$BinaryByteCharCryptMultiStringWide$wsprintf$AddressCountErrorHandleLastModuleProcTick_memset
                                                      • String ID: &$&advert=+380668846667$&id=$&priv_key=$&pub_key=$&subid=$.$.$=$action=call&$e$o$popkadurak$s
                                                      • API String ID: 3331976855-889238998
                                                      • Opcode ID: d0ca3cd12af2541b8688803f579bab54c5d4c2ada6f2638c9555e4a9ad453d03
                                                      • Instruction ID: 6877c0eb6252de596230c6ac8cfb07dd21d431d89cd1a3889842607e5e05d78e
                                                      • Opcode Fuzzy Hash: d0ca3cd12af2541b8688803f579bab54c5d4c2ada6f2638c9555e4a9ad453d03
                                                      • Instruction Fuzzy Hash: 1E026971608705AFD721DF24CC85BABBBE9FF88704F100A5DF585A7290DBB0E9058B96

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 295 bb7ce0-bb7d7a VirtualAlloc * 2 296 bb7d7c-bb7d92 CreateToolhelp32Snapshot 295->296 297 bb7da2-bb7daa 295->297 298 bb7dad-bb7dc7 Process32FirstW 296->298 299 bb7d94-bb7d9c VirtualFree 296->299 300 bb7e9d-bb7ebb VirtualFree CloseHandle 298->300 301 bb7dcd 298->301 299->297 302 bb7ebd-bb7ec5 VirtualFree 300->302 303 bb7ec7-bb7ecf 300->303 304 bb7dd0-bb7dd2 301->304 302->303 305 bb7dd8-bb7ddb 304->305 306 bb7e77-bb7e7b 304->306 309 bb7de0-bb7ded lstrcmpiW 305->309 307 bb7e7d-bb7e83 306->307 308 bb7e95-bb7e9b 306->308 307->308 310 bb7e85-bb7e90 lstrlenW 307->310 308->300 311 bb7dfa-bb7e08 309->311 312 bb7def-bb7df3 309->312 310->308 314 bb7e0a-bb7e1d lstrcpyW lstrcatW 311->314 315 bb7e1f-bb7e2e lstrcatW * 2 311->315 312->309 313 bb7df5-bb7df8 312->313 316 bb7e57-bb7e66 Process32NextW 313->316 317 bb7e30-bb7e54 lstrlenW 314->317 315->317 316->306 318 bb7e68-bb7e71 GetLastError 316->318 317->316 318->304 318->306
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,756EF3C0,?,760773E0), ref: 00BB7CFD
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00BB7D71
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00BB7D86
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB7D9C
                                                      • Process32FirstW.KERNEL32(00000000,00000000), ref: 00BB7DBF
                                                      • lstrcmpiW.KERNEL32(00BC03D4,-00000024), ref: 00BB7DE5
                                                      • Process32NextW.KERNEL32(?,?), ref: 00BB7E5E
                                                      • GetLastError.KERNEL32 ref: 00BB7E68
                                                      • lstrlenW.KERNEL32(00000000), ref: 00BB7E86
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB7EAB
                                                      • CloseHandle.KERNEL32(?), ref: 00BB7EB0
                                                      • VirtualFree.KERNEL32(?,?,00008000), ref: 00BB7EC5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Free$AllocProcess32$CloseCreateErrorFirstHandleLastNextSnapshotToolhelp32lstrcmpilstrlen
                                                      • String ID: AVP.EXE$Mcshield.exe$NortonAntiBot.exe$ashDisp.exe$avengine.exe$avgnt.exe$cfp.exe$cmdagent.exe$ekrn.exe$fsguiexe.exe$msmpeng.exe$pccpfw.exe$persfw.exe$smc.exe
                                                      • API String ID: 2470459410-3383346926
                                                      • Opcode ID: 4ea1489317bb40e540eb6deee1cd9c420f71e30f46d379434e4832a7756d586f
                                                      • Instruction ID: 43cc6de8574d4f742b88e20352844030a898f50175b1a15ec1e9627cc8c99df8
                                                      • Opcode Fuzzy Hash: 4ea1489317bb40e540eb6deee1cd9c420f71e30f46d379434e4832a7756d586f
                                                      • Instruction Fuzzy Hash: A4516C72E54218EBCB24AF98DC49BAE7BF4FF89710F204199E604BB290CBB05905CF55

                                                      Control-flow Graph

                                                      APIs
                                                      • InternetCloseHandle.WININET(?), ref: 00BB84E3
                                                      • InternetConnectW.WININET(?,00000000,00000050,00000000,00000000,00000003,00000000,00000000), ref: 00BB8502
                                                      • VirtualAlloc.KERNEL32(00000000,00002800,00003000,00000040,?,?,?,?,?,?,?,00BB71B6,ipv4bot.whatismyipaddress.com,00BBFFB8,00000000,00000000), ref: 00BB852F
                                                      • wsprintfW.USER32 ref: 00BB8543
                                                      • HttpOpenRequestW.WININET(00000000,?,00000000,HTTP/1.1,00000000,00000000,8404F700,00000000), ref: 00BB8561
                                                      • HttpAddRequestHeadersW.WININET(00000000,006F0048,000000FF,00000000), ref: 00BB85C5
                                                      • HttpSendRequestW.WININET(00000000,00610072,0020003A,00000000,00740069), ref: 00BB85DC
                                                      • InternetReadFile.WININET(00000000,0062002E,00650071,00000000), ref: 00BB85FB
                                                      • InternetReadFile.WININET(00000000,0062002E,00650071,00000000), ref: 00BB8625
                                                      • GetLastError.KERNEL32 ref: 00BB8631
                                                      • InternetCloseHandle.WININET(00000000), ref: 00BB863E
                                                      • InternetCloseHandle.WININET(00000000), ref: 00BB8643
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,00BB71B6,ipv4bot.whatismyipaddress.com,00BBFFB8), ref: 00BB864F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleHttpRequest$FileReadVirtual$AllocConnectErrorFreeHeadersLastOpenSendwsprintf
                                                      • String ID: .$:$H$HTTP/1.1$i$n$o$r$r$s$w
                                                      • API String ID: 3906118045-693250572
                                                      • Opcode ID: e7a7024ba2734c74f5d931b2276a8b9119d9b8415450b65a26fcfa34a70be029
                                                      • Instruction ID: 8739e0cbce05e2e153fd8eff1b9b74529125a71c4b72b4390c592fed5ac1684b
                                                      • Opcode Fuzzy Hash: e7a7024ba2734c74f5d931b2276a8b9119d9b8415450b65a26fcfa34a70be029
                                                      • Instruction Fuzzy Hash: BE416C31A40208BBEB209F58DC49FEE7FBCEB05794F104159F904B6290CBF59A50CBA5

                                                      Control-flow Graph

                                                      APIs
                                                      • Sleep.KERNEL32(000003E8), ref: 00BB4B3B
                                                        • Part of subcall function 00BB47E0: VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB483C
                                                        • Part of subcall function 00BB47E0: lstrcpyW.KERNEL32(00000000,Global\,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB485F
                                                        • Part of subcall function 00BB47E0: lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB4866
                                                        • Part of subcall function 00BB47E0: CreateMutexW.KERNEL32(00000000,00000000,00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB487E
                                                        • Part of subcall function 00BB47E0: GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB488A
                                                        • Part of subcall function 00BB47E0: GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB4891
                                                        • Part of subcall function 00BB47E0: VirtualFree.KERNEL32(00000000,00000000,00008000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB48AB
                                                      • ExitProcess.KERNEL32 ref: 00BB4B4C
                                                      • CreateThread.KERNEL32(00000000,00000000,00BB2D30,00000000,00000000,00000000), ref: 00BB4B61
                                                      • WaitForSingleObject.KERNEL32(00000000,00001388), ref: 00BB4B79
                                                      • TerminateThread.KERNEL32(00000000,00000000), ref: 00BB4B8C
                                                      • CloseHandle.KERNEL32(00000000), ref: 00BB4B96
                                                      • VirtualAlloc.KERNEL32(00000000,00000200,00003000,00000004,00000000,00000000,00000000,00000000), ref: 00BB4C0A
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00BB4C24
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB4C3D
                                                      • ExitProcess.KERNEL32 ref: 00BB4C45
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocCreateErrorExitFreeLastProcessThread$CloseFileHandleModuleMutexNameObjectSingleSleepTerminateWaitlstrcpylstrlen
                                                      • String ID: open
                                                      • API String ID: 1803241880-2758837156
                                                      • Opcode ID: 1393cd581c3b9695455471936f6ab1efca72602cbc48b833ae9a9e36e0234693
                                                      • Instruction ID: b298b908ae65543a589ca7535f4e537cb73d9a606f6957a71c921a042c193f83
                                                      • Opcode Fuzzy Hash: 1393cd581c3b9695455471936f6ab1efca72602cbc48b833ae9a9e36e0234693
                                                      • Instruction Fuzzy Hash: A771E770E40208ABEB14EBA4DD5AFEEBBB4FB08B01F104558F601BA1D1DBF45A44CB65

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 416 bb5400-bb5431 lstrlenA VirtualAlloc 417 bb543c 416->417 418 bb5433-bb5436 416->418 420 bb543e-bb5453 CryptStringToBinaryA 417->420 418->417 419 bb5438-bb543a 418->419 419->420 421 bb5459-bb5477 call bb6010 call bb33e0 420->421 422 bb550c-bb5512 GetLastError 420->422 428 bb547d-bb549d 421->428 429 bb5514-bb557b call bb5380 call bb82c0 call bb5250 lstrlenA VirtualAlloc * 2 421->429 424 bb54f3-bb550b VirtualFree 422->424 431 bb54c8-bb54d5 428->431 432 bb549f-bb54be lstrlenA VirtualAlloc 428->432 446 bb5588 429->446 447 bb557d-bb5582 429->447 435 bb54d7-bb54df HeapFree 431->435 436 bb54e4-bb54e6 431->436 432->431 434 bb54c0-bb54c2 lstrcpyA 432->434 434->431 435->436 437 bb54e8-bb54ee HeapFree 436->437 438 bb54f0 436->438 437->438 438->424 449 bb558a-bb5624 lstrcatA lstrlenA lstrlenW lstrlenA call bb84d0 446->449 447->446 448 bb5584-bb5586 447->448 448->449 452 bb5657-bb5682 VirtualFree * 3 449->452 453 bb5626-bb562f 449->453 455 bb568b-bb5693 452->455 456 bb5684-bb5685 InternetCloseHandle 452->456 453->452 454 bb5631-bb5645 call bb5400 453->454 459 bb5647-bb564c 454->459 460 bb5655 454->460 456->455 459->452 461 bb564e-bb5653 459->461 460->452 461->452
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB540F
                                                      • VirtualAlloc.KERNEL32(00000000,00000002,00003000,00000040,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB5426
                                                      • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00BB544B
                                                      • lstrlenA.KERNEL32(?,00003000,00000004,00000000,?,?,?,?,00BB5643,00000000,?), ref: 00BB54A7
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,?,?,?,?,00BB5643,00000000,?), ref: 00BB54B1
                                                      • lstrcpyA.KERNEL32(00000000,?,?,?,?,?,00BB5643,00000000,?), ref: 00BB54C2
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00BB5643,00000000,?), ref: 00BB54DD
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00BB5643,00000000,?), ref: 00BB54EE
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB54FD
                                                      • GetLastError.KERNEL32(?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB550C
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00BB5542
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00BB5562
                                                      • VirtualAlloc.KERNEL32(00000000,00032001,00003000,00000040), ref: 00BB5574
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 00BB558E
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB55E3
                                                      • lstrlenW.KERNEL32(?), ref: 00BB55EF
                                                      • lstrlenA.KERNEL32(00000000,00000000,00031FFF,?,00000000), ref: 00BB560B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00000000,00000000,?,00000000), ref: 00BB5665
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00BB5671
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00BB567B
                                                      • InternetCloseHandle.WININET(00BB587A), ref: 00BB5685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Freelstrlen$Alloc$Heap$BinaryCloseCryptErrorHandleInternetLastStringlstrcatlstrcpy
                                                      • String ID: POST
                                                      • API String ID: 1287001821-1814004025
                                                      • Opcode ID: 2ac341f1b3fea2aa7b7f571f58e3139b45458fb7afcddb2d103a34850ba2a6cc
                                                      • Instruction ID: 7d1ccb337adf43677a8776857b993425ed0b9bbdf5b5917a6b135f87fc544702
                                                      • Opcode Fuzzy Hash: 2ac341f1b3fea2aa7b7f571f58e3139b45458fb7afcddb2d103a34850ba2a6cc
                                                      • Instruction Fuzzy Hash: C1719171E00709ABDB219BA9DC45BFEBBB8EF89701F104255FA05B7240DFB49940CBA1
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00BB874D
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00BB877B
                                                      • GetModuleHandleA.KERNEL32(?), ref: 00BB87CF
                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00BB87DD
                                                      • GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00BB87EC
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00BB8835
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB8843
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00BB8857
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB8865
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtual$FreeRelease$AcquireAddressAllocHandleLibraryLoadModuleProc
                                                      • String ID: Advapi32.dll$CryptGenRandomAdvapi32.dll
                                                      • API String ID: 3996966626-2152921537
                                                      • Opcode ID: d18b5cae2c0fa20354e9bfed7827928d9d2a74aa2d3484edd4f6c1e36444c751
                                                      • Instruction ID: e59021d1cae42e2280ccf1c00eec436c89f2dd9122fb6c9e4fe1f72cd01913b6
                                                      • Opcode Fuzzy Hash: d18b5cae2c0fa20354e9bfed7827928d9d2a74aa2d3484edd4f6c1e36444c751
                                                      • Instruction Fuzzy Hash: 4D31A575A00209ABDB209FE5DC85BFEBBBCEF05701F504169E501B7150EFB59A01CB65
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00BB88A0
                                                      • VirtualAlloc.KERNEL32(00000000,00000007,00003000,00000040), ref: 00BB88C8
                                                      • GetModuleHandleA.KERNEL32(?), ref: 00BB891D
                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00BB892B
                                                      • GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00BB893A
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00BB895E
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB896C
                                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00BB292B), ref: 00BB8980
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,?,?,00BB292B), ref: 00BB898E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtual$FreeRelease$AcquireAddressAllocHandleLibraryLoadModuleProc
                                                      • String ID: Advapi32.dll$CryptGenRandomAdvapi32.dll
                                                      • API String ID: 3996966626-2152921537
                                                      • Opcode ID: 95919b242b9ba1afc44a580f24baf0097e23179041d46b6513cbaf173863038b
                                                      • Instruction ID: 03038fe9f013be1385d867f57d43afe8e22d0e979eacacdada0d4c2f784ac394
                                                      • Opcode Fuzzy Hash: 95919b242b9ba1afc44a580f24baf0097e23179041d46b6513cbaf173863038b
                                                      • Instruction Fuzzy Hash: 50318475E00209AFEF109FA5DC4ABEEBBBCEB45701F104169F605B6190DBB59A00CB66
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(00BB4BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,00BB4BA6,?,00BB4BAE), ref: 00BB6508
                                                      • GetLastError.KERNEL32(?,00BB4BAE), ref: 00BB6512
                                                      • CryptAcquireContextW.ADVAPI32(00BB4BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00BB4BAE), ref: 00BB652E
                                                      • CryptGenKey.ADVAPI32(00BB4BAE,0000A400,08000001,?,?,00BB4BAE), ref: 00BB655A
                                                      • CryptExportKey.ADVAPI32(?,00000000,00000006,00000000,?,00000000), ref: 00BB657E
                                                      • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?), ref: 00BB6596
                                                      • CryptDestroyKey.ADVAPI32(?), ref: 00BB65A0
                                                      • CryptReleaseContext.ADVAPI32(00BB4BAE,00000000), ref: 00BB65AC
                                                      • CryptAcquireContextW.ADVAPI32(00BB4BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000010), ref: 00BB65C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$Context$Acquire$Export$DestroyErrorLastRelease
                                                      • String ID: Microsoft Enhanced Cryptographic Provider v1.0
                                                      • API String ID: 137402220-1948191093
                                                      • Opcode ID: 6bdf9bc27dda57a0f6e7c8322ffa718646d4fcfa6ec12c546cca0ce3619aace5
                                                      • Instruction ID: 62134179998dfec2546d277a9456d14db271782c9f52c5fb2c8b4092e1f1845d
                                                      • Opcode Fuzzy Hash: 6bdf9bc27dda57a0f6e7c8322ffa718646d4fcfa6ec12c546cca0ce3619aace5
                                                      • Instruction Fuzzy Hash: 1D218675B80309BBDB20DFA0DC46FEA3B78A754B00F504554F701A71D4DAF5D9409B61
                                                      APIs
                                                        • Part of subcall function 00BB82C0: InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00BB84A4
                                                        • Part of subcall function 00BB82C0: InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 00BB84BD
                                                      • VirtualAlloc.KERNEL32(00000000,00002801,00003000,00000040,756EF3C0,?), ref: 00BB717F
                                                      • lstrlenW.KERNEL32(00BBFFB4), ref: 00BB718C
                                                        • Part of subcall function 00BB84D0: InternetCloseHandle.WININET(?), ref: 00BB84E3
                                                        • Part of subcall function 00BB84D0: InternetConnectW.WININET(?,00000000,00000050,00000000,00000000,00000003,00000000,00000000), ref: 00BB8502
                                                      • lstrlenA.KERNEL32(00000000,ipv4bot.whatismyipaddress.com,00BBFFB8,00000000,00000000,00000000,000027FF,?,00000000), ref: 00BB71BB
                                                      • wsprintfW.USER32 ref: 00BB71D3
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,ipv4bot.whatismyipaddress.com,00BBFFB8,00000000,00000000,00000000,000027FF,?,00000000), ref: 00BB71E9
                                                      • InternetCloseHandle.WININET(?), ref: 00BB71F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleOpenVirtuallstrlen$AllocConnectFreewsprintf
                                                      • String ID: GET$ipv4bot.whatismyipaddress.com
                                                      • API String ID: 4289327240-2259699238
                                                      • Opcode ID: 46af1ea55f38af3d8961608153d3f6caed6a7242f715a04fa5f706b0107e4cbf
                                                      • Instruction ID: 73237293792a8486d01dde336446b7f63db3a5581df2fbf2ec840fe009ed0199
                                                      • Opcode Fuzzy Hash: 46af1ea55f38af3d8961608153d3f6caed6a7242f715a04fa5f706b0107e4cbf
                                                      • Instruction Fuzzy Hash: CE019236B8120477DA206B699C8EFFF3EACEB82B51F000164FA05F21D0DEE48505C6A6
                                                      APIs
                                                      • K32EnumDeviceDrivers.KERNEL32(?,00000004,?), ref: 00BB2F74
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00BB2F8D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocDeviceDriversEnumVirtual
                                                      • String ID:
                                                      • API String ID: 4140748134-0
                                                      • Opcode ID: 02e56b0922c66e3d31d1602c5d932d8c9696eacb692921d58fde1a3c2c665fbf
                                                      • Instruction ID: ba92a6a2be4017cf95e33f441bbf53af622dadb338d31f6b68af0d85090ba320
                                                      • Opcode Fuzzy Hash: 02e56b0922c66e3d31d1602c5d932d8c9696eacb692921d58fde1a3c2c665fbf
                                                      • Instruction Fuzzy Hash: 56219832A00119ABEB209B989C45FF977BCEB44711F1042A6FA04F7180DBB199059B91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction ID: 9643a78b3b1bbf8b08af985c7592dde61be512dc3ccdd5d0a345bd07aa5cda75
                                                      • Opcode Fuzzy Hash: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction Fuzzy Hash: D8D19075E042168FCB24CF58C880BE9B7B1FF58B18F2955A9D895AB341D335ED81CB90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 175 bb82c0-bb84ab InternetOpenW 176 bb84ad-bb84bf InternetOpenW 175->176 177 bb84c2-bb84c8 175->177 176->177
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00BB84A4
                                                      • InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 00BB84BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InternetOpen
                                                      • String ID: $ $ $ $ $ $($)$.$.$0$1$3$3$3$5$5$5$5$6$6$7$7$8$8$A$G$K$K$L$M$O$T$T$a$a$a$c$d$e$e$e$e$h$i$i$i$l$o$o$p$t$w$z
                                                      • API String ID: 2038078732-2805935662
                                                      • Opcode ID: 9c7515bce8fb11c91b5dcaf89b1e5fd2559b11b2b8bfc63564cba51f9f9712f7
                                                      • Instruction ID: 23522251ac923da7a4dc3a3e2986072c955d058e254ebbd16b4211c2e513aef9
                                                      • Opcode Fuzzy Hash: 9c7515bce8fb11c91b5dcaf89b1e5fd2559b11b2b8bfc63564cba51f9f9712f7
                                                      • Instruction Fuzzy Hash: 0C41B7B4811368DEEB218F91999879EBFF5FB00748F50818EC5086B201C7F60A89CF60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 178 bb7210-bb7228 179 bb722a-bb724a lstrcatW * 4 178->179 180 bb724c-bb724f 178->180 179->180 181 bb726d-bb7271 180->181 182 bb7251-bb726b lstrcatW * 4 180->182 183 bb728f-bb7293 181->183 184 bb7273-bb728d lstrcatW * 4 181->184 182->181 185 bb72b1-bb72b5 183->185 186 bb7295-bb72af lstrcatW * 4 183->186 184->183 187 bb72d3-bb72d7 185->187 188 bb72b7-bb72d1 lstrcatW * 4 185->188 186->185 189 bb72d9-bb72f3 lstrcatW * 4 187->189 190 bb72f5-bb72f9 187->190 188->187 189->190 191 bb72fb-bb7315 lstrcatW * 4 190->191 192 bb7317-bb731b 190->192 191->192 193 bb7339-bb733d 192->193 194 bb731d-bb7337 lstrcatW * 4 192->194 195 bb735b-bb735f 193->195 196 bb733f-bb7359 lstrcatW * 4 193->196 194->193 197 bb73cc-bb73d0 195->197 198 bb7361-bb737a VirtualAlloc 195->198 196->195 201 bb73ee-bb7402 lstrlenW 197->201 202 bb73d2-bb73ec lstrcatW * 4 197->202 199 bb737c-bb738f wsprintfW 198->199 200 bb7391-bb739d wsprintfW 198->200 203 bb73a0-bb73c6 lstrcatW * 4 VirtualFree 199->203 200->203 202->201 203->197
                                                      APIs
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB7231
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7239
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7242
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB724A
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB7255
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB725D
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7263
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB726B
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB7277
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB727F
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7285
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB728D
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB7299
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72A1
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72A7
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72AF
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB72BB
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72C3
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72C9
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72D1
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB72DD
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72E5
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72EB
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB72F3
                                                      • lstrcatW.KERNEL32(?,00BB4B46,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB72FF
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7307
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB730D
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7315
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB7321
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7329
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB732F
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7337
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB7343
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB734B
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7351
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7359
                                                      • VirtualAlloc.KERNEL32(00000000,00000042,00003000,00000040,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000), ref: 00BB736C
                                                      • wsprintfW.USER32 ref: 00BB7386
                                                      • wsprintfW.USER32 ref: 00BB7397
                                                      • lstrcatW.KERNEL32(?,?,?,00000000,00000000,?,00000000), ref: 00BB73A4
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,00000000,00000000,?,00000000), ref: 00BB73AC
                                                      • lstrcatW.KERNEL32(?,?,?,00000000,00000000,?,00000000), ref: 00BB73B2
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,00000000,00000000,?,00000000), ref: 00BB73BA
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00BB73C6
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00BB73D6
                                                      • lstrcatW.KERNEL32(?,00BBFFF8,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB73DE
                                                      • lstrcatW.KERNEL32(?,?,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB73E4
                                                      • lstrcatW.KERNEL32(?,00BBFFFC,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB73EC
                                                      • lstrlenW.KERNEL32(?,00000000,00000000,?,?,00BB4879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB73EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtualwsprintf$AllocFreelstrlen
                                                      • String ID: %x%x$undefined
                                                      • API String ID: 3872469520-3801831566
                                                      • Opcode ID: 1daf4a86037a01dfc52d723ca22865656cdce408d9d05a228ed9a51390d2c5fa
                                                      • Instruction ID: 1ff593f149aa74c46929e2ed7d3be1cc003ee5756866dd8f0ad6cd5cd5926a4d
                                                      • Opcode Fuzzy Hash: 1daf4a86037a01dfc52d723ca22865656cdce408d9d05a228ed9a51390d2c5fa
                                                      • Instruction Fuzzy Hash: 6551FF31147565B7CB273B658C49FFF3E99EFC6701F1500A0F900640A68FA98652DFAA

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 204 bb48d0-bb4a66 CreateToolhelp32Snapshot VirtualAlloc 205 bb4a7b-bb4a81 204->205 206 bb4a68-bb4a71 204->206 208 bb4a84-bb4a86 205->208 206->205 207 bb4a73-bb4a75 Process32FirstW 206->207 207->205 209 bb4a90-bb4a9d lstrcmpiW 208->209 210 bb4acb-bb4ad2 209->210 211 bb4a9f-bb4aaf OpenProcess 209->211 210->209 214 bb4ad4-bb4ae5 Process32NextW 210->214 212 bb4ab1-bb4ac3 TerminateProcess CloseHandle 211->212 213 bb4ac5 211->213 212->210 213->210 214->208 215 bb4ae7-bb4ae9 214->215 216 bb4aeb-bb4af3 VirtualFree 215->216 217 bb4af9-bb4b02 CloseHandle 215->217 216->217
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00BB4A42
                                                      • VirtualAlloc.KERNEL32(00000000,0000022C,00003000,00000004), ref: 00BB4A5C
                                                      • Process32FirstW.KERNEL32(00000000,00000000), ref: 00BB4A75
                                                      • lstrcmpiW.KERNEL32(00000002,00000024), ref: 00BB4A95
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BB4AA5
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00BB4AB4
                                                      • CloseHandle.KERNEL32(00000000), ref: 00BB4AC1
                                                      • Process32NextW.KERNEL32(?,00000000), ref: 00BB4ADA
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB4AF3
                                                      • CloseHandle.KERNEL32(?), ref: 00BB4AFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcessProcess32Virtual$AllocCreateFirstFreeNextOpenSnapshotTerminateToolhelp32lstrcmpi
                                                      • String ID: agntsvc.exeagntsvc.exe$agntsvc.exeencsvc.exe$agntsvc.exeisqlplussvc.exe$dbeng50.exe$dbsnmp.exe$excel.exe$firefoxconfig.exe$infopath.exe$msaccess.exe$msftesql.exe$mspub.exe$mydesktopqos.exe$mydesktopservice.exe$mysqld-nt.exe$mysqld-opt.exe$mysqld.exe$ocautoupds.exe$ocomm.exe$ocssd.exe$onenote.exe$oracle.exe$outlook.exe$powerpnt.exe$sqbcoreservice.exe$sqlagent.exe$sqlbrowser.exe$sqlservr.exe$sqlwriter.exe$steam.exe$synctime.exe$tbirdconfig.exe$thebat.exe$thebat64.exe$thunderbird.exe$visio.exe$winword.exe$wordpad.exe$xfssvccon.exe
                                                      • API String ID: 3586910739-2697476765
                                                      • Opcode ID: cfff25c21cf80ce7e699b4415aa01c89ff5b511d045c8f9026640d4ab49fb870
                                                      • Instruction ID: 9ce458cdc4ef00f49493c73fe6fb9e8eb7781b89055536b43c61b4f85f860eb2
                                                      • Opcode Fuzzy Hash: cfff25c21cf80ce7e699b4415aa01c89ff5b511d045c8f9026640d4ab49fb870
                                                      • Instruction Fuzzy Hash: 495130B25083429FD7208F559C487FBBBE4FB85708F504AACE5996B261DBF08809CF56

                                                      Control-flow Graph

                                                      APIs
                                                      • CreatePipe.KERNEL32(00BC3080,00BC307C,?,00000000,00000001,00000001,00000000), ref: 00BB518D
                                                      • SetHandleInformation.KERNEL32(00000001,00000000), ref: 00BB51B1
                                                      • CreatePipe.KERNEL32(00BC3078,00BC3084,0000000C,00000000), ref: 00BB51CA
                                                      • SetHandleInformation.KERNEL32(00000001,00000000), ref: 00BB51DA
                                                      • VirtualAlloc.KERNEL32(00000000,00002800,00003000,00000004), ref: 00BB51EE
                                                      • wsprintfW.USER32 ref: 00BB51FF
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB5220
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateHandleInformationPipeVirtual$AllocFreewsprintf
                                                      • String ID: $ $.$.$1$2$S$S$c$c$d$d$fabian wosar <3$l$l$m$m$n$n$n$n$n$n$o$o$o$o$u$u$u$u
                                                      • API String ID: 1490407255-1922363339
                                                      • Opcode ID: a2f9e564a52772667de5a725514ad6665ef6923998c078a452f4f229b3a3d9f6
                                                      • Instruction ID: 4f4550631a5955406035f51f7031ad5f0c64d5e81e18c5a528c54b278c6b27f9
                                                      • Opcode Fuzzy Hash: a2f9e564a52772667de5a725514ad6665ef6923998c078a452f4f229b3a3d9f6
                                                      • Instruction Fuzzy Hash: EF412D71E40318ABEB209F94DC49BEDBFF6EB04B05F504159E504AB291CBF645898FA1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 229 bb42c0-bb42d5 230 bb42db-bb4340 call bb3bd0 call bb7600 call bb7410 VirtualAlloc 229->230 231 bb45a8-bb45ad 229->231 238 bb4342-bb434b 230->238 239 bb4351 230->239 238->239 240 bb434d-bb434f 238->240 241 bb4353-bb439a call bb7210 call bb8670 lstrlenW 239->241 240->241 246 bb43a0-bb43b2 241->246 246->246 247 bb43b4 246->247 248 bb43c0-bb43cd 247->248 248->248 249 bb43cf-bb43ec call bb8670 248->249 252 bb43ee 249->252 253 bb4466-bb4555 249->253 256 bb43f0-bb4416 lstrcpyW lstrlenW 252->256 254 bb4588-bb45a3 VirtualFree call bb7ee0 253->254 255 bb4557-bb4572 VirtualAlloc 253->255 254->231 255->254 258 bb4574-bb4585 wsprintfW 255->258 256->253 257 bb4418-bb441d 256->257 260 bb4423-bb442b 257->260 258->254 261 bb442d 260->261 262 bb4457-bb4464 260->262 263 bb4430-bb4436 261->263 262->253 262->260 264 bb45ae-bb45b5 263->264 265 bb443c-bb4442 263->265 264->256 266 bb444d-bb4451 265->266 267 bb4444-bb444b 265->267 266->262 266->264 267->263 267->266
                                                      APIs
                                                        • Part of subcall function 00BB3BD0: GetProcessHeap.KERNEL32(?,?,00BB4817,00000000,?,00000000,00000000), ref: 00BB3C6C
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00BB7627
                                                        • Part of subcall function 00BB7600: GetUserNameW.ADVAPI32(00000000,?), ref: 00BB7638
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00BB7656
                                                        • Part of subcall function 00BB7600: GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00BB7660
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00BB7680
                                                        • Part of subcall function 00BB7600: wsprintfW.USER32 ref: 00BB76C1
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00BB76DE
                                                        • Part of subcall function 00BB7600: RegOpenKeyExW.KERNEL32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00BB7702
                                                        • Part of subcall function 00BB7600: RegQueryValueExW.KERNEL32(00000000,LocaleName,00000000,00000000,00BB4820,?), ref: 00BB7726
                                                        • Part of subcall function 00BB7600: RegCloseKey.KERNEL32(00000000), ref: 00BB7742
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7462
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB746D
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7483
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB748E
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74A4
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74AF
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74C5
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(00BB4B46,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74D0
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74E6
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74F1
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7507
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7512
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7531
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB753C
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB4331
                                                      • lstrlenW.KERNEL32(ransom_id=,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB4373
                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB43F2
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB43F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$AllocVirtual$Name$CloseComputerHeapOpenProcessQueryUserValuelstrcpywsprintf
                                                      • String ID: -$.$.$/$/$a$a$c$d$d$h$h$j$l$m$n$n$o$o$r$r$r$ransom_id=$s$t$t$w$w$w$y${USERID}
                                                      • API String ID: 4100118565-2385900546
                                                      • Opcode ID: 2b2e06a3861af6c9328ce237a756d111cd9d5d227a0dac42c8bd781e33607ad4
                                                      • Instruction ID: e317ff50f23f112562df49f5868361cacfd9d5984d50ee585eccdf6a20d67041
                                                      • Opcode Fuzzy Hash: 2b2e06a3861af6c9328ce237a756d111cd9d5d227a0dac42c8bd781e33607ad4
                                                      • Instruction Fuzzy Hash: E27113705043409BE7209F14C81ABBBBBE1FB80B48F144A6CF6855B292DFF59948CB96

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 268 bb43b6-bb43bd 269 bb43c0-bb43cd 268->269 269->269 270 bb43cf-bb43ec call bb8670 269->270 273 bb43ee 270->273 274 bb4466-bb4555 270->274 277 bb43f0-bb4416 lstrcpyW lstrlenW 273->277 275 bb4588-bb45ad VirtualFree call bb7ee0 274->275 276 bb4557-bb4572 VirtualAlloc 274->276 276->275 279 bb4574-bb4585 wsprintfW 276->279 277->274 278 bb4418-bb441d 277->278 281 bb4423-bb442b 278->281 279->275 283 bb442d 281->283 284 bb4457-bb4464 281->284 285 bb4430-bb4436 283->285 284->274 284->281 286 bb45ae-bb45b5 285->286 287 bb443c-bb4442 285->287 286->277 288 bb444d-bb4451 287->288 289 bb4444-bb444b 287->289 288->284 288->286 289->285 289->288
                                                      APIs
                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB43F2
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB43F9
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004), ref: 00BB4565
                                                      • wsprintfW.USER32 ref: 00BB457F
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB4596
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocFreelstrcpylstrlenwsprintf
                                                      • String ID: -$.$.$/$/$a$a$c$d$d$h$h$j$l$m$n$n$o$o$r$r$r$s$t$t$w$w$w$y${USERID}
                                                      • API String ID: 4033391921-3341315666
                                                      • Opcode ID: 64089055a0745a464a411b93d4a4c0b8ff5394c7858d0f61931f47074c62afd1
                                                      • Instruction ID: aa22306df30a21ba7bea02dbc41b5aebf2ccad73992187733735f539e213d1eb
                                                      • Opcode Fuzzy Hash: 64089055a0745a464a411b93d4a4c0b8ff5394c7858d0f61931f47074c62afd1
                                                      • Instruction Fuzzy Hash: 164190B0504341CBD7209F14D8587BBBFE2FB81B48F04895CE6850B262DBFA8589CB52

                                                      Control-flow Graph

                                                      APIs
                                                      • lstrlenW.KERNEL32(00520050,00000041,7572F770,00000000), ref: 00BB299D
                                                        • Part of subcall function 00BB8730: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00BB874D
                                                        • Part of subcall function 00BB8730: VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00BB877B
                                                        • Part of subcall function 00BB8730: GetModuleHandleA.KERNEL32(?), ref: 00BB87CF
                                                        • Part of subcall function 00BB8730: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00BB87DD
                                                        • Part of subcall function 00BB8730: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00BB87EC
                                                        • Part of subcall function 00BB8730: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00BB8835
                                                        • Part of subcall function 00BB8730: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB8843
                                                      • RegCreateKeyExW.KERNEL32(80000001,004F0053,00000000,00000000,00000000,000F003F,00000000,00BB2C45,00000000), ref: 00BB2A84
                                                      • lstrlenW.KERNEL32(00000000), ref: 00BB2A8F
                                                      • RegSetValueExW.KERNEL32(00BB2C45,00520050,00000000,00000001,00000000,00000000), ref: 00BB2AA4
                                                      • RegCloseKey.KERNEL32(00BB2C45), ref: 00BB2AB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtuallstrlen$AcquireAddressAllocCloseCreateFreeHandleLibraryLoadModuleProcReleaseValue
                                                      • String ID: A$F$H$I$P$R$R$S$U$V$W$\$\$\$d$e$f$i$i$i$n$n$n$n$r$r$r$s$u$w
                                                      • API String ID: 553367697-3791882466
                                                      • Opcode ID: 7b8a0611e079440f0376193382c7a52401465d9f0403cfc7d3389c12d4d58af3
                                                      • Instruction ID: cce1de1e8b621166b1bb1c735b34dabe639d28e3e0051ceabddf08c623716745
                                                      • Opcode Fuzzy Hash: 7b8a0611e079440f0376193382c7a52401465d9f0403cfc7d3389c12d4d58af3
                                                      • Instruction Fuzzy Hash: F331E9B0D0021CDFEB208F91A848BEDBFB9FB01709F508159D5186A291DBFA49488F95

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00BB2F50: K32EnumDeviceDrivers.KERNEL32(?,00000004,?), ref: 00BB2F74
                                                      • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 00BB2E19
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00BB2E2E
                                                      • LoadIconW.USER32 ref: 00BB2E59
                                                      • RegisterClassExW.USER32(?), ref: 00BB2E68
                                                      • ExitThread.KERNEL32 ref: 00BB2E75
                                                        • Part of subcall function 00BB2F50: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00BB2F8D
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,00007F00), ref: 00BB2E7B
                                                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00007F00), ref: 00BB2E81
                                                      • CreateWindowExW.USER32(00000000,win32app,firefox,00CF0000,80000000,80000000,00000005,00000005,00000000,00000000,00000000), ref: 00BB2EA7
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00BB2EB4
                                                      • ExitThread.KERNEL32 ref: 00BB2EBF
                                                        • Part of subcall function 00BB2F50: K32EnumDeviceDrivers.KERNEL32(00000000,00000000,?), ref: 00BB2FA8
                                                        • Part of subcall function 00BB2F50: K32GetDeviceDriverBaseNameW.KERNEL32(00000000,?,00000400), ref: 00BB2FCF
                                                        • Part of subcall function 00BB2F50: lstrcmpiW.KERNEL32(?,006C006B), ref: 00BB2FE3
                                                        • Part of subcall function 00BB2F50: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB2FFA
                                                      • ExitThread.KERNEL32 ref: 00BB2F3F
                                                        • Part of subcall function 00BB2AD0: VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000040), ref: 00BB2AEA
                                                        • Part of subcall function 00BB2AD0: GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00BB2B2C
                                                        • Part of subcall function 00BB2AD0: GetTempPathW.KERNEL32(00000100,00000000), ref: 00BB2B38
                                                        • Part of subcall function 00BB2AD0: ExitThread.KERNEL32 ref: 00BB2C47
                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,00007F00), ref: 00BB2EC8
                                                      • UpdateWindow.USER32(00000000), ref: 00BB2ECF
                                                      • CreateThread.KERNEL32(00000000,00000000,00BB2D10,00000000,00000000,00000000), ref: 00BB2EE3
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00007F00), ref: 00BB2EEE
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BB2F05
                                                      • TranslateMessage.USER32(?), ref: 00BB2F1C
                                                      • DispatchMessageW.USER32(?), ref: 00BB2F23
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BB2F37
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$ExitHandleMessageModuleWindow$DeviceVirtual$AllocCreateDriversEnumLoadName$BaseClassCloseCursorDispatchDriverFileFreeIconLongPathRegisterShowTempTranslateUpdatelstrcmpi
                                                      • String ID: 0$1$d$f$firefox$k$s$s$s$s$w$win32app
                                                      • API String ID: 3011903443-520298170
                                                      • Opcode ID: 509b58e09620f3154e42db347f85ac4d85817910aaee7d676a57964dee9e706e
                                                      • Instruction ID: d1e99c8fc373816659ba1997f711af32c0e20ff2d367ee36c982baa6458d1f5a
                                                      • Opcode Fuzzy Hash: 509b58e09620f3154e42db347f85ac4d85817910aaee7d676a57964dee9e706e
                                                      • Instruction Fuzzy Hash: CC517B70548301AFE3209F61CC09BAB7AE4EF45B44F104918F684AB2D0EBF49509CB96

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 462 bb2ad0-bb2b00 VirtualAlloc 463 bb2b1c-bb2b1e 462->463 464 bb2b02-bb2b1a 462->464 465 bb2b20-bb2b4a GetModuleFileNameW GetTempPathW call bb8670 463->465 464->465 468 bb2b4c-bb2b4e 465->468 469 bb2b53-bb2bae lstrlenW call bb8730 GetEnvironmentVariableW call bb8670 465->469 470 bb2c40 call bb2960 468->470 477 bb2bd8-bb2bfd lstrcatW * 3 call bb2890 469->477 478 bb2bb0-bb2bc4 469->478 475 bb2c45-bb2c47 ExitThread 470->475 480 bb2c02-bb2c07 477->480 483 bb2bd3 478->483 484 bb2bc6-bb2bd1 478->484 480->475 482 bb2c09-bb2c1d 480->482 488 bb2c1f-bb2c2a 482->488 489 bb2c2c 482->489 485 bb2bd5-bb2bd6 483->485 484->483 484->485 487 bb2c2f-bb2c3d wsprintfW 485->487 487->470 488->489 490 bb2c2e 488->490 489->490 490->487
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000040), ref: 00BB2AEA
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00BB2B2C
                                                      • GetTempPathW.KERNEL32(00000100,00000000), ref: 00BB2B38
                                                      • lstrlenW.KERNEL32(?,?,?,00000052), ref: 00BB2B7D
                                                        • Part of subcall function 00BB8730: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00BB874D
                                                        • Part of subcall function 00BB8730: VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00BB877B
                                                        • Part of subcall function 00BB8730: GetModuleHandleA.KERNEL32(?), ref: 00BB87CF
                                                        • Part of subcall function 00BB8730: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00BB87DD
                                                        • Part of subcall function 00BB8730: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00BB87EC
                                                        • Part of subcall function 00BB8730: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00BB8835
                                                        • Part of subcall function 00BB8730: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB8843
                                                      • GetEnvironmentVariableW.KERNEL32(AppData,00000000,00000100), ref: 00BB2B9C
                                                      • lstrcatW.KERNEL32(00000000,\Microsoft\), ref: 00BB2BE4
                                                      • lstrcatW.KERNEL32(00000000,?), ref: 00BB2BEC
                                                      • lstrcatW.KERNEL32(00000000,.exe), ref: 00BB2BF4
                                                      • wsprintfW.USER32 ref: 00BB2C35
                                                      • ExitThread.KERNEL32 ref: 00BB2C47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtuallstrcat$AllocContextCryptModule$AcquireAddressEnvironmentExitFileFreeHandleLibraryLoadNamePathProcReleaseTempThreadVariablelstrlenwsprintf
                                                      • String ID: "%s"$.exe$AppData$I$P$U$\Microsoft\
                                                      • API String ID: 139215849-2398311915
                                                      • Opcode ID: ee973c86c8df754c015e68dd440eeaf490eb5d9ed102101e0250bfd1ff7cd9cf
                                                      • Instruction ID: 162acd1aea7631906d035cbe4ccb0c482d205902f3abdbf0bf810af579132e51
                                                      • Opcode Fuzzy Hash: ee973c86c8df754c015e68dd440eeaf490eb5d9ed102101e0250bfd1ff7cd9cf
                                                      • Instruction Fuzzy Hash: 0D41BE71604300ABE304EF24DC8ABBF7BD9EF84704F040568B955A7292DEF49908CBA7
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,00000000,00000000,00000000), ref: 00BB52AD
                                                      • Sleep.KERNEL32(000003E8), ref: 00BB52F0
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00BB52FE
                                                      • VirtualAlloc.KERNEL32(00000000,00000000), ref: 00BB530E
                                                      • lstrcmpiA.KERNEL32(00000000,fabian wosar <3), ref: 00BB532A
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB533B
                                                      • wsprintfW.USER32 ref: 00BB5353
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB5364
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocFree$Sleeplstrcmpilstrlenwsprintf
                                                      • String ID: alar$fabian wosar <3$it$m.bi$omwa$rans$re.b$t$zone
                                                      • API String ID: 2709691373-1552681713
                                                      • Opcode ID: 0a8cda0e771bd0409fb63209e25d5afb50ff73ab2d0c21a11c19c01a57593e77
                                                      • Instruction ID: 6d0da09a7d67da35e91ab11df4abecb529b60e97e894694b91fc2867aab42627
                                                      • Opcode Fuzzy Hash: 0a8cda0e771bd0409fb63209e25d5afb50ff73ab2d0c21a11c19c01a57593e77
                                                      • Instruction Fuzzy Hash: B431B370E00318ABDB209FA8DD86BEE7BB8FF44714F100255FA16B72D0DAF459048B96
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00BB8139
                                                        • Part of subcall function 00BB7FB0: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 00BB809A
                                                        • Part of subcall function 00BB7FB0: lstrcatW.KERNEL32(00000000,00BC0584), ref: 00BB8115
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00BB818F
                                                      • VirtualAlloc.KERNEL32(00000000,00000000), ref: 00BB81A1
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00BB81B1
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB81BB
                                                      • lstrcatW.KERNEL32(00000000,00BC0604), ref: 00BB81D1
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00BB822C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB823A
                                                      • lstrcatW.KERNEL32(00000000,00BBFFF8), ref: 00BB8280
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00BB8288
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB8296
                                                      • lstrcatW.KERNEL32(00000000,00BBFFFC), ref: 00BB82A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtual$Free$Alloc$CountTicklstrlen
                                                      • String ID: VUUU$VUUU
                                                      • API String ID: 2785072370-3149182767
                                                      • Opcode ID: 4f6cf208b125c3ad44cc61afbf0c8abb32152c225ab548e07a783b21077283b8
                                                      • Instruction ID: d9f2cdbc1a939e2f2cb9715ac3460d75c3c86c6e9b81fb86ed0f86448e50198a
                                                      • Opcode Fuzzy Hash: 4f6cf208b125c3ad44cc61afbf0c8abb32152c225ab548e07a783b21077283b8
                                                      • Instruction Fuzzy Hash: 2031EC72E40100ABD31CAB2CDC4AF7D7AECEB55711F04057DF902EB291DEB4AA00CA65
                                                      APIs
                                                        • Part of subcall function 00BB82C0: InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00BB84A4
                                                        • Part of subcall function 00BB82C0: InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 00BB84BD
                                                        • Part of subcall function 00BB5250: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,00000000,00000000,00000000), ref: 00BB52AD
                                                        • Part of subcall function 00BB5250: Sleep.KERNEL32(000003E8), ref: 00BB52F0
                                                        • Part of subcall function 00BB5250: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00BB52FE
                                                        • Part of subcall function 00BB5250: VirtualAlloc.KERNEL32(00000000,00000000), ref: 00BB530E
                                                        • Part of subcall function 00BB5250: lstrcmpiA.KERNEL32(00000000,fabian wosar <3), ref: 00BB532A
                                                        • Part of subcall function 00BB5250: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB533B
                                                        • Part of subcall function 00BB5250: wsprintfW.USER32 ref: 00BB5353
                                                        • Part of subcall function 00BB5250: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB5364
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00BB5542
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00BB5562
                                                      • VirtualAlloc.KERNEL32(00000000,00032001,00003000,00000040), ref: 00BB5574
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 00BB558E
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB55E3
                                                      • lstrlenW.KERNEL32(?), ref: 00BB55EF
                                                      • lstrlenA.KERNEL32(00000000,00000000,00031FFF,?,00000000), ref: 00BB560B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00000000,00000000,?,00000000), ref: 00BB5665
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00BB5671
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00BB567B
                                                      • InternetCloseHandle.WININET(00BB587A), ref: 00BB5685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Freelstrlen$Alloc$Internet$Open$CloseHandleSleeplstrcatlstrcmpiwsprintf
                                                      • String ID: POST
                                                      • API String ID: 2554059081-1814004025
                                                      • Opcode ID: f38a784b56b3d0283d2765751ef5b806dd6e80b51b6cb4216f756a1f824b8897
                                                      • Instruction ID: 4e5113ef50ac7e39c50a6c700c66ca878d5bf6e8641495c88cd08f16bb6845dc
                                                      • Opcode Fuzzy Hash: f38a784b56b3d0283d2765751ef5b806dd6e80b51b6cb4216f756a1f824b8897
                                                      • Instruction Fuzzy Hash: B3419071D0070AABEB219BA8DC55BFEBBB8EF88740F104255EA44B7240DFF45644CB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__setargv__setenvp
                                                      • String ID: .$
                                                      • API String ID: 3919536372-2223841709
                                                      • Opcode ID: dbb733a5e10b4fae72fb9b3a4c589561448fcb65a6d9c54a36be18f213393641
                                                      • Instruction ID: e142a31e64e4df3c1a55f3b50acac9504b33397bac4141d9dcc45f5873fa0522
                                                      • Opcode Fuzzy Hash: dbb733a5e10b4fae72fb9b3a4c589561448fcb65a6d9c54a36be18f213393641
                                                      • Instruction Fuzzy Hash: F2219770A003019EDB2477F5AC46B6D32E4AB10719F1175EAF618FE0E2EF7589C89A51
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,0000000A,00003000,00000004,00000000,00000000), ref: 00BB6033
                                                      • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00BB6048
                                                      • GetProcAddress.KERNEL32(00000000,RtlComputeCrc32), ref: 00BB6059
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB6064
                                                      • wsprintfA.USER32 ref: 00BB607C
                                                      • _memset.LIBCMT ref: 00BB609B
                                                      • lstrlenA.KERNEL32(00000000), ref: 00BB60A4
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB60D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtuallstrlen$AddressAllocFreeHandleModuleProc_memsetwsprintf
                                                      • String ID: %Xeuropol$RtlComputeCrc32$ntdll.dll
                                                      • API String ID: 218840185-1387466253
                                                      • Opcode ID: 2b9435e0ca987735441182af9bdc63787cc651079525766c16f534b318369ef3
                                                      • Instruction ID: d5e1efe7d2ac6c48cecfef4997ed02d78f9a975b4f36c732ab8b7aa2139aab2a
                                                      • Opcode Fuzzy Hash: 2b9435e0ca987735441182af9bdc63787cc651079525766c16f534b318369ef3
                                                      • Instruction Fuzzy Hash: 2D119375E40208BBD7216B689C4AFFE7FACEB55B00F1001A4F945F3190DEF459408A52
                                                      APIs
                                                        • Part of subcall function 00BB3BD0: GetProcessHeap.KERNEL32(?,?,00BB4817,00000000,?,00000000,00000000), ref: 00BB3C6C
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00BB7627
                                                        • Part of subcall function 00BB7600: GetUserNameW.ADVAPI32(00000000,?), ref: 00BB7638
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00BB7656
                                                        • Part of subcall function 00BB7600: GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00BB7660
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00BB7680
                                                        • Part of subcall function 00BB7600: wsprintfW.USER32 ref: 00BB76C1
                                                        • Part of subcall function 00BB7600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00BB76DE
                                                        • Part of subcall function 00BB7600: RegOpenKeyExW.KERNEL32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00BB7702
                                                        • Part of subcall function 00BB7600: RegQueryValueExW.KERNEL32(00000000,LocaleName,00000000,00000000,00BB4820,?), ref: 00BB7726
                                                        • Part of subcall function 00BB7600: RegCloseKey.KERNEL32(00000000), ref: 00BB7742
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7462
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB746D
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7483
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB748E
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74A4
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74AF
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74C5
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(00BB4B46,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74D0
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74E6
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74F1
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7507
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7512
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7531
                                                        • Part of subcall function 00BB7410: lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB753C
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB483C
                                                      • lstrcpyW.KERNEL32(00000000,Global\,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB485F
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB4866
                                                      • CreateMutexW.KERNEL32(00000000,00000000,00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB487E
                                                      • GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB488A
                                                      • GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB4891
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB48AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Virtual$Alloc$ErrorLastName$CloseComputerCreateFreeHeapMutexOpenProcessQueryUserValuelstrcpywsprintf
                                                      • String ID: Global\
                                                      • API String ID: 3131499543-188423391
                                                      • Opcode ID: 14c6eb073eb9c7c40c7ec8be1bbc02cb4a7bc681d29ffa71d6f92834d54ddd60
                                                      • Instruction ID: 7557d2030d13acb1be9ee5189671c3fd798b1c4475acd7d343fc610259ab2e9d
                                                      • Opcode Fuzzy Hash: 14c6eb073eb9c7c40c7ec8be1bbc02cb4a7bc681d29ffa71d6f92834d54ddd60
                                                      • Instruction Fuzzy Hash: 8921A171AA43147BE124A724DC8BFBF7A98EB40B40F500668B605670D1AFD46D0486E6
                                                      APIs
                                                        • Part of subcall function 00BB7FB0: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 00BB809A
                                                        • Part of subcall function 00BB7FB0: lstrcatW.KERNEL32(00000000,00BC0584), ref: 00BB8115
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00BB822C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB823A
                                                      • lstrcatW.KERNEL32(00000000,00BBFFF8), ref: 00BB8280
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00BB8288
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB8296
                                                      • lstrcatW.KERNEL32(00000000,00BBFFFC), ref: 00BB82A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtual$Free$Alloc
                                                      • String ID: VUUU$VUUU
                                                      • API String ID: 418921519-3149182767
                                                      • Opcode ID: 97bee9ef7aa90ab3cdea991c69be380785cc49c894778bfd9cfd4bb6c8c00b2b
                                                      • Instruction ID: ba0118ab2fc1b7e1b3db66940813c98e3ad4d013c26b961fa413736291d29f02
                                                      • Opcode Fuzzy Hash: 97bee9ef7aa90ab3cdea991c69be380785cc49c894778bfd9cfd4bb6c8c00b2b
                                                      • Instruction Fuzzy Hash: 2E11B233E04100ABC31CAB2CDC8AF79BBECE795700F04496DF542EB291CEB4A5018B65
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000A00,00003000,00000004,756EE0B0,?), ref: 00BB35E9
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100,756F0440), ref: 00BB3600
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00BB3616
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00BB3626
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00BB3639
                                                      • ReadFile.KERNEL32(00000000,00000000,00000001,?,00000000), ref: 00BB364C
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB368D
                                                      • CloseHandle.KERNEL32(00000000), ref: 00BB3694
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB36A2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileVirtual$AllocFree$CloseCreateHandleModuleNameReadSize
                                                      • String ID:
                                                      • API String ID: 2352497600-0
                                                      • Opcode ID: 2d6ea4edd7d3eef2904868cb10a4df0b0d8fd06a404e3338ae97719ba39ce48d
                                                      • Instruction ID: 976b9396d256430e073f642e55cdafb50452a7e26a40bcd7dd010264dcf8cab9
                                                      • Opcode Fuzzy Hash: 2d6ea4edd7d3eef2904868cb10a4df0b0d8fd06a404e3338ae97719ba39ce48d
                                                      • Instruction Fuzzy Hash: 9021D831B403047BEB255BA89C86FEE7BE8EB49B11F200159FB05B62D0DBF59A018755
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,7572F770,00000000,?,?,00BB2C02), ref: 00BB28AB
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,00BB2C02), ref: 00BB28BA
                                                      • CreateFileMappingW.KERNELBASE(00000000,00000000,-00000008,00000000,00000000,00000000,?,?,00BB2C02), ref: 00BB28E5
                                                      • CloseHandle.KERNEL32(00000000,?,?,00BB2C02), ref: 00BB28F3
                                                      • MapViewOfFile.KERNEL32(00000000,7572F771,00000000,00000000,00000000,?,?,00BB2C02), ref: 00BB290A
                                                      • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,00BB2C02), ref: 00BB2942
                                                      • CloseHandle.KERNEL32(?,?,?,00BB2C02), ref: 00BB2951
                                                      • CloseHandle.KERNEL32(00000000,?,?,00BB2C02), ref: 00BB2954
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateView$MappingSizeUnmap
                                                      • String ID:
                                                      • API String ID: 265113797-0
                                                      • Opcode ID: 2cf95b9974d6997dbfa5303ef1226b49b127844bbe97bf02b6a5b9db907e9fa4
                                                      • Instruction ID: 041d3738aa7131e5374c1339803d05c51191fa0bced3ec7fded8ece0a1a331d5
                                                      • Opcode Fuzzy Hash: 2cf95b9974d6997dbfa5303ef1226b49b127844bbe97bf02b6a5b9db907e9fa4
                                                      • Instruction Fuzzy Hash: E621D471E112197FE7106B789C86FBE7BECDB46665F1002A5FC05B3280EAB49D0145A1
                                                      APIs
                                                      • _memset.LIBCMT ref: 00BB4E39
                                                      • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,?,?,?,?,00000000), ref: 00BB4E7F
                                                      • GetLastError.KERNEL32(?,?,00000000), ref: 00BB4E89
                                                      • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00BB4E9D
                                                      • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00BB4EA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$CreateErrorLastProcess_memset
                                                      • String ID: D
                                                      • API String ID: 1393943095-2746444292
                                                      • Opcode ID: 418e63c98e47f95181f83f90d55b10d466524a518fa583bbcdca6a2ba25ef7e4
                                                      • Instruction ID: 5f75a430d6a1427a78fcbaf12a7f7fa4d3673cee7454c3d374e189457acd7ade
                                                      • Opcode Fuzzy Hash: 418e63c98e47f95181f83f90d55b10d466524a518fa583bbcdca6a2ba25ef7e4
                                                      • Instruction Fuzzy Hash: 3E016171E40318ABDB20DFA8AC42BDE7BB8EF09710F104256FA08B7190EBB055548B95
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000000,00000000,00000000), ref: 00E011F2
                                                      • GetLastError.KERNEL32 ref: 00E011F8
                                                      • ExitProcess.KERNEL32(00000000), ref: 00E01204
                                                      • ExitThread.KERNEL32 ref: 00E01234
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitProcess$ErrorLastOpenThread
                                                      • String ID: -$1
                                                      • API String ID: 153595879-1877142845
                                                      • Opcode ID: 955e73982a6bfb51cc31bd11b2bb9f578a65e42054012477822fa454edf00ee4
                                                      • Instruction ID: e91f1c886941b94453cdcf9325dd80abaa10652b36601afd5942e578e7925ba7
                                                      • Opcode Fuzzy Hash: 955e73982a6bfb51cc31bd11b2bb9f578a65e42054012477822fa454edf00ee4
                                                      • Instruction Fuzzy Hash: BF01ADB0D012149FDB189FE588087EEBEF9FF09301F20826AD515FA292D37409C5CBA4
                                                      APIs
                                                      • lstrcmpiW.KERNEL32(00000002,00000024), ref: 00BB4A95
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BB4AA5
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00BB4AB4
                                                      • CloseHandle.KERNEL32(00000000), ref: 00BB4AC1
                                                      • Process32NextW.KERNEL32(?,00000000), ref: 00BB4ADA
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB4AF3
                                                      • CloseHandle.KERNEL32(?), ref: 00BB4AFA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess$FreeNextOpenProcess32TerminateVirtuallstrcmpi
                                                      • String ID:
                                                      • API String ID: 999196985-0
                                                      • Opcode ID: e9e0884ff4d4d53e34ff36270e6528bb16919ed2302a5e65a46e7ebfd44fb9f9
                                                      • Instruction ID: 28813b44d729414f4d3a36343afe9f201a6f0f38414ad337a443c9431bb8ce6b
                                                      • Opcode Fuzzy Hash: e9e0884ff4d4d53e34ff36270e6528bb16919ed2302a5e65a46e7ebfd44fb9f9
                                                      • Instruction Fuzzy Hash: F101F932640100BFD7206F54AC85BBA73ACFF85701F254254FD09A7062EFF09C048B66
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 00BB809A
                                                      • lstrcatW.KERNEL32(00000000,00BC0584), ref: 00BB8115
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtuallstrcat
                                                      • String ID: eigh$ere$ore
                                                      • API String ID: 3624338217-3418171569
                                                      • Opcode ID: 0921b74b2eaa943e34de65a7a3ba9426d9f8c9f82c86c7de4a3476443b6407bd
                                                      • Instruction ID: 0c061ba8f33baae9ab3416364e847947bbc3ee877302a864f9e9ebb3ca17070f
                                                      • Opcode Fuzzy Hash: 0921b74b2eaa943e34de65a7a3ba9426d9f8c9f82c86c7de4a3476443b6407bd
                                                      • Instruction Fuzzy Hash: 8F3115B2D21209CBCB14EF889888BADBEF8EB64708F20469CD5147B240CBB48549CF54
                                                      APIs
                                                      • RegOpenKeyExW.KERNEL32(?,?,00000000,00020019,?,?,0000060C,?,00BB79F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00BB7596
                                                      • RegQueryValueExW.KERNEL32(?,?,00000000,00000000,00000080,?,?,00BB79F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00BB75B7
                                                      • RegCloseKey.KERNEL32(?,?,00BB79F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00BB75C7
                                                      • GetLastError.KERNEL32(?,00BB79F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00BB75D6
                                                      • RegCloseKey.ADVAPI32(?,?,00BB79F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00BB75DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$ErrorLastOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 2437438455-0
                                                      • Opcode ID: 5a5014d4e6abfa81a7aa8bda26a59a19197e07ac386cb55f05f1559c6289f832
                                                      • Instruction ID: 5b016eb5f0a2e71289d179a8257ba7adf0e3b19f16c9e56ff152a97bde1d29d3
                                                      • Opcode Fuzzy Hash: 5a5014d4e6abfa81a7aa8bda26a59a19197e07ac386cb55f05f1559c6289f832
                                                      • Instruction Fuzzy Hash: 75012132A0411CFFDB20AF94ED05DEA7BA8EB08751F004162FD05D6120DB729A24EBE1
                                                      APIs
                                                      • CreateFileW.KERNEL32(00BB2C02,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00000000,00BB2C02,?,00BB293C,?), ref: 00BB284C
                                                      • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,00BB293C,?,?,?,?,00BB2C02), ref: 00BB2869
                                                      • CloseHandle.KERNEL32(00000000,?,00BB293C,?,?,?,?,00BB2C02), ref: 00BB2879
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleWrite
                                                      • String ID:
                                                      • API String ID: 1065093856-0
                                                      • Opcode ID: f4df484e4dbb1067c1e77300625ac3e3ebe78fabca88512d137517cd29466fa1
                                                      • Instruction ID: c5a00f636c8e9e97e3f70445309c2f6a09aaef4bfbc1d8ee6547eea47390fab6
                                                      • Opcode Fuzzy Hash: f4df484e4dbb1067c1e77300625ac3e3ebe78fabca88512d137517cd29466fa1
                                                      • Instruction Fuzzy Hash: 71F0A772B0021477E6300B99AC8AFBBB69CDB86B60F104265FE08F71E0DAE09C0142A5
                                                      APIs
                                                      • ReadFile.KERNEL32(?,00001000,00000000,00000000,00000000,00000000,00000000,?,00BB5218), ref: 00BB4FEE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID: Can't find server
                                                      • API String ID: 2738559852-1141070784
                                                      • Opcode ID: a53c179413f5b703a67a7a25b7bc535ccce99f48dc1a22ef3645d892ca1cd19a
                                                      • Instruction ID: 6f4e47851ecc1f897e6f489e4ce6bb140760d56da68eb7143a1b22412c585a48
                                                      • Opcode Fuzzy Hash: a53c179413f5b703a67a7a25b7bc535ccce99f48dc1a22ef3645d892ca1cd19a
                                                      • Instruction Fuzzy Hash: 34113A35C046999BEB32DB548D507FABBF8EF4A301F5481E5E88457200E6F06E88C7D2
                                                      APIs
                                                      • VirtualProtect.KERNEL32(00E120C0,00012400,00000040,00000002,00E0FD30,00000018,00E0122F), ref: 00E0114C
                                                      • VirtualProtect.KERNEL32(00E120C0,00012400,00000002,?), ref: 00E01180
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 1a25784f5432ec4e6d66403147ebe41fb5819c2b2908947c924fbd11187f0127
                                                      • Instruction ID: ffbed86ddfa6aa4488dbe9ad3d50018e8e359af524a993504836ff84e5c7e471
                                                      • Opcode Fuzzy Hash: 1a25784f5432ec4e6d66403147ebe41fb5819c2b2908947c924fbd11187f0127
                                                      • Instruction Fuzzy Hash: F90171B0940309AADB10DFE18C42FDDB6B5BB0C714F542299E601F61C1DB749690CA34
                                                      APIs
                                                      • LCMapStringEx.KERNEL32(?,?,?,?,?,5EFC4D8B,00000000,00000000,00000000,?,00E055A0,?,?,00000000,?,00000000), ref: 00E059A9
                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,5EFC4D8B,?,00E055A0,?,?,00000000,?,00000000,00000000), ref: 00E059C6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: String
                                                      • String ID:
                                                      • API String ID: 2568140703-0
                                                      • Opcode ID: d39e46c3a5830d02ef7c731f15eef126025364efb5db656053f9a5641b6aece8
                                                      • Instruction ID: 4439011cd06bed74223b6164a7e77caea22579b866f5bced0ed3a26d4b60e864
                                                      • Opcode Fuzzy Hash: d39e46c3a5830d02ef7c731f15eef126025364efb5db656053f9a5641b6aece8
                                                      • Instruction Fuzzy Hash: 55F07F7301014EFFDF069F94EC0ACEA3B6AFB48360B408114FA2855070D772A9B1ABA0
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,00000000,00BB4B30,00000000,00000000,00000000), ref: 00BB4DFC
                                                      • CloseHandle.KERNEL32(00000000), ref: 00BB4E0F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateHandleThread
                                                      • String ID:
                                                      • API String ID: 3032276028-0
                                                      • Opcode ID: d59538cb0cc1220faf05d959e7d8b8384b8d1f1095278ede652887371d06077b
                                                      • Instruction ID: d6cdcf0b610547e4c4b91393698561990f6621e4aa19c5d40f3658ea7f18f11e
                                                      • Opcode Fuzzy Hash: d59538cb0cc1220faf05d959e7d8b8384b8d1f1095278ede652887371d06077b
                                                      • Instruction Fuzzy Hash: CDF01C34A80208FBDB24DF94984ABACB7B0FB15705F20819AE901772D1D7F1AA50CB05
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000123,00003000,00000004,?,?,00BB4BAE), ref: 00BB6675
                                                      • VirtualAlloc.KERNEL32(00000000,00000515,00003000,00000004,?,00BB4BAE), ref: 00BB668F
                                                        • Part of subcall function 00BB64F0: CryptAcquireContextW.ADVAPI32(00BB4BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,00BB4BA6,?,00BB4BAE), ref: 00BB6508
                                                        • Part of subcall function 00BB64F0: GetLastError.KERNEL32(?,00BB4BAE), ref: 00BB6512
                                                        • Part of subcall function 00BB64F0: CryptAcquireContextW.ADVAPI32(00BB4BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00BB4BAE), ref: 00BB652E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AcquireAllocContextCryptVirtual$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3824161113-0
                                                      • Opcode ID: 1cf136f125ab2abe70a1331d0bf40081dbd0e370f5683e943f8059859e43a1db
                                                      • Instruction ID: d4a0418c709f7d4b4e5ecdf2a2ac8e0ab3f7b4a66f0cf5c4b02a0e64d6718f7d
                                                      • Opcode Fuzzy Hash: 1cf136f125ab2abe70a1331d0bf40081dbd0e370f5683e943f8059859e43a1db
                                                      • Instruction Fuzzy Hash: 7211DB74A40208EFD704CF88DA55F99B7F5EF88709F208188E908AB381D7B5AF009F54
                                                      APIs
                                                        • Part of subcall function 00BB8130: GetTickCount.KERNEL32 ref: 00BB8139
                                                        • Part of subcall function 00BB8130: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00BB818F
                                                        • Part of subcall function 00BB8130: VirtualAlloc.KERNEL32(00000000,00000000), ref: 00BB81A1
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00000000), ref: 00BB81B1
                                                        • Part of subcall function 00BB8130: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB81BB
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00BC0604), ref: 00BB81D1
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00000000), ref: 00BB822C
                                                        • Part of subcall function 00BB8130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB823A
                                                        • Part of subcall function 00BB8130: lstrcatW.KERNEL32(00000000,00BBFFF8), ref: 00BB8280
                                                      • VirtualAlloc.KERNEL32(00000000,00004C02,00003000,00000040,?,00000000,?), ref: 00BB56E4
                                                      • wsprintfW.USER32 ref: 00BB5714
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000), ref: 00BB575D
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000), ref: 00BB5779
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00BB5790
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004,?,00000000,00000000,?,00000000), ref: 00BB579E
                                                      • VirtualAlloc.KERNEL32(00000000,-00000002,?,00000000,00000000,?,00000000), ref: 00BB57A6
                                                      • wsprintfA.USER32 ref: 00BB57BC
                                                      • CryptBinaryToStringA.CRYPT32(?,756EE0B0,40000001,00000000,?,?,00000000,00000000,?,00000000), ref: 00BB57F0
                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,00000000), ref: 00BB57FA
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00BB5807
                                                      • VirtualAlloc.KERNEL32(00000000,-00000004,00003000,00000040,?,00000000,00000000,?,00000000), ref: 00BB5819
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00BB5823
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00BB5841
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00BB5860
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00BB58A0
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00BB58AC
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00BB58C3
                                                      Strings
                                                      • popkadurak, xrefs: 00BB56C7
                                                      • action=result&e_files=%d&e_size=%I64u&e_time=%d&, xrefs: 00BB570E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$lstrlen$Free$Alloclstrcat$wsprintf$BinaryCountCryptErrorLastStringTick
                                                      • String ID: action=result&e_files=%d&e_size=%I64u&e_time=%d&$popkadurak
                                                      • API String ID: 487841380-2102589890
                                                      • Opcode ID: 0131b8d2707cf480eb64118d8a42182e1cc7f2082ac197a935fcdfacc228d569
                                                      • Instruction ID: 4fcea715bac4abc45919c2b981bae38d4e961e6ad64fe6a652372aee4b4d0b7a
                                                      • Opcode Fuzzy Hash: 0131b8d2707cf480eb64118d8a42182e1cc7f2082ac197a935fcdfacc228d569
                                                      • Instruction Fuzzy Hash: 8E517070E40219BBEB209B64DC46FAE7BB9EB44700F1001A9F605B7190DBF4AE01CB96
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000), ref: 00BB6CC2
                                                      • lstrcatW.KERNEL32(00000000,00BBFF64,?,00000000), ref: 00BB6CD4
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,00000000), ref: 00BB6CE2
                                                      • lstrcmpW.KERNEL32(?,00BBFF68,?,00000000), ref: 00BB6D0C
                                                      • lstrcmpW.KERNEL32(?,00BBFF6C,?,00000000), ref: 00BB6D22
                                                      • lstrcatW.KERNEL32(00000000,?,?,00000000), ref: 00BB6D34
                                                      • lstrlenW.KERNEL32(00000000,?,00000000), ref: 00BB6D3B
                                                      • lstrcmpW.KERNEL32(-00000001,.sql,?,00000000), ref: 00BB6D6A
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 00BB6D81
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000), ref: 00BB6D8C
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,00000000), ref: 00BB6DAA
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000), ref: 00BB6DBF
                                                      • lstrlenA.KERNEL32(*******************,?,00000000), ref: 00BB6DDE
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00BB6DF9
                                                      • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00BB6E03
                                                      • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 00BB6E2C
                                                      • FindClose.KERNEL32(?,?,00000000), ref: 00BB6E3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Findlstrcmplstrlen$CloseVirtuallstrcat$AllocCreateFirstFreeHandleNextReadSize
                                                      • String ID: *******************$.sql
                                                      • API String ID: 3616287438-58436570
                                                      • Opcode ID: f8eebcad8bc811b9b0f3e964c5664a81ca0f5a1aa2b94c49177a16a0b11b1910
                                                      • Instruction ID: 4c87c9155f2a2738749a6076ae83cfe4863c77ffcb76f4a49d6f4e3ac85adeb0
                                                      • Opcode Fuzzy Hash: f8eebcad8bc811b9b0f3e964c5664a81ca0f5a1aa2b94c49177a16a0b11b1910
                                                      • Instruction Fuzzy Hash: 9A411971A01219ABDB20AB64DC89BBA77ACEB05700F5045A5F902E3150EFF89E05CB61
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(00BC3058,?,00BB38F4,00000000,00000000,00000000,?,00000800), ref: 00BB677B
                                                      • CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,?,00BB38F4,00000000,00000000,00000000), ref: 00BB67A1
                                                      • GetLastError.KERNEL32(?,00BB38F4,00000000,00000000,00000000), ref: 00BB67AB
                                                      • CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00BB38F4,00000000,00000000,00000000), ref: 00BB67C7
                                                      • LeaveCriticalSection.KERNEL32(00BC3058,?,00BB38F4,00000000,00000000,00000000), ref: 00BB67D6
                                                      • LeaveCriticalSection.KERNEL32(00BC3058,?,00BB38F4,00000000,00000000,00000000), ref: 00BB67EA
                                                      • CryptImportKey.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,?,00BB38F4,00000000,00000000), ref: 00BB6812
                                                      • CryptGetKeyParam.ADVAPI32(00000000,00000008,00BB38F4,0000000A,00000000,?,00BB38F4,00000000), ref: 00BB6833
                                                      • CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,0000000A,00000000,00BB38F4,?,00BB38F4,00000000), ref: 00BB685B
                                                      • GetLastError.KERNEL32(?,00BB38F4,00000000), ref: 00BB6864
                                                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,00BB38F4,00000000,00000000), ref: 00BB6881
                                                      • LeaveCriticalSection.KERNEL32(00BC3058,?,00BB38F4,00000000,00000000), ref: 00BB688C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$CriticalSection$ContextLeave$AcquireErrorLast$EncryptEnterImportParamRelease
                                                      • String ID: Microsoft Enhanced Cryptographic Provider v1.0
                                                      • API String ID: 3173605824-1948191093
                                                      • Opcode ID: 1425753556e8a1d2de9d22e439ac4a1ee5197224e81b5428220ac8d6acd6e209
                                                      • Instruction ID: 46d5b8e3a3f3face8d6b6cc18ee27c3f0b80418ddc0c1264e4fcdcb6caa5b646
                                                      • Opcode Fuzzy Hash: 1425753556e8a1d2de9d22e439ac4a1ee5197224e81b5428220ac8d6acd6e209
                                                      • Instruction Fuzzy Hash: F2313E75A40209BBDB10DFA0DD89FEE7BF8AB48B00F504158FA01A7190DBF59A049B62
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,?), ref: 00BB6F60
                                                      • lstrcatW.KERNEL32(00000000,00BBFF64,?,?), ref: 00BB6F78
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?), ref: 00BB6F82
                                                        • Part of subcall function 00BB68A0: VirtualAlloc.KERNEL32(00000000,00000201,00003000,00000040,00000000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB68BC
                                                        • Part of subcall function 00BB68A0: VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB6914
                                                      • lstrcmpW.KERNEL32(?,00BBFF68,?,?), ref: 00BB6FB0
                                                      • lstrcmpW.KERNEL32(?,00BBFF6C,?,?), ref: 00BB6FCA
                                                      • lstrcatW.KERNEL32(00000000,?,?,?), ref: 00BB6FE0
                                                      • lstrcatW.KERNEL32(00000000,00BBFFA4,?,?), ref: 00BB7007
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?), ref: 00BB708D
                                                      • FindClose.KERNEL32(00000000,?,?), ref: 00BB709E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Findlstrcat$FileVirtuallstrcmp$AllocCloseFirstFreeNextlstrlen
                                                      • String ID: SQL
                                                      • API String ID: 991218351-1299261525
                                                      • Opcode ID: 6f5150fa4595fdb399ebff7a73f93d377645a19fd1cc67fea985152cfeb50506
                                                      • Instruction ID: 32ad9adef1ff386ad68ba7ada4323329f919c999c22c753ce6723d770dfcb2ff
                                                      • Opcode Fuzzy Hash: 6f5150fa4595fdb399ebff7a73f93d377645a19fd1cc67fea985152cfeb50506
                                                      • Instruction Fuzzy Hash: 95516D31A04209ABDF10AF64EC85AFEB7F9EF85314F4441EAE908E7150DBB59E10DB51
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00BB3673,?), ref: 00BB3504
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,00BB3673,?), ref: 00BB351C
                                                      • CryptStringToBinaryA.CRYPT32(00BB3673,00000000,00000001,00000000,?,00000000,00000000), ref: 00BB3535
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00BB3673,?), ref: 00BB354C
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00BB3673,?), ref: 00BB3561
                                                      • wsprintfW.USER32 ref: 00BB3587
                                                      • wsprintfW.USER32 ref: 00BB3597
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00BB3673,?), ref: 00BB35A9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$wsprintf$BinaryCryptFreeStringlstrlen
                                                      • String ID:
                                                      • API String ID: 2885909284-0
                                                      • Opcode ID: 339b522fa149f62166e950adb27ac84d0a920654c56a1241a558089980a473ca
                                                      • Instruction ID: 8d66901d27e36e909cba2ae8b17d3b42bf1bcf045caff4058ca0c4d4cca633ce
                                                      • Opcode Fuzzy Hash: 339b522fa149f62166e950adb27ac84d0a920654c56a1241a558089980a473ca
                                                      • Instruction Fuzzy Hash: 8A219371A40219BFEB219B688C41FAABFECEF45B50F1000A5F644F7290DAF55E008B95
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00BB3CB0
                                                      • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 00BB3CC3
                                                      • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 00BB3CCF
                                                      • FreeSid.ADVAPI32(?), ref: 00BB3CEA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressAllocateFreeHandleInitializeModuleProc
                                                      • String ID: CheckTokenMembership$advapi32.dll
                                                      • API String ID: 3309497720-1888249752
                                                      • Opcode ID: 3eac1e5ae813115c82d88c69d9875605bc20de633ce8dc4961ccc377f0b34066
                                                      • Instruction ID: a796aafe7ac1c8a1e4d9b5354740d5c6bb2069a8e68749651db6049bf0097043
                                                      • Opcode Fuzzy Hash: 3eac1e5ae813115c82d88c69d9875605bc20de633ce8dc4961ccc377f0b34066
                                                      • Instruction Fuzzy Hash: 91F0FF34E4030DBBDB109BE4DC0AFFD77B8EB04705F504694F905A7190EBB456148B55
                                                      APIs
                                                        • Part of subcall function 00BB32B0: lstrlenA.KERNEL32(?,00000000,?,00BB5474,?,?,00BB33F6,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB32C5
                                                        • Part of subcall function 00BB32B0: lstrlenA.KERNEL32(?,?,00BB33F6,00000000,00000000,?,?,00BB5474,00000000,?,?,?,?,00BB5643,00000000,?), ref: 00BB32EE
                                                      • lstrlenA.KERNEL32(00BB5475,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000,?,?,?,?,00BB5643,00000000,?), ref: 00BB3484
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,00BB5474,00000000,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB348E
                                                      • HeapAlloc.KERNEL32(00000000,?,00BB5474,00000000,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB3495
                                                      • lstrcpyA.KERNEL32(00000000,00BB5475,?,00BB5474,00000000,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB34A7
                                                      • ExitProcess.KERNEL32 ref: 00BB34DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$HeapProcess$AllocExitlstrcpy
                                                      • String ID:
                                                      • API String ID: 1867342102-0
                                                      • Opcode ID: 6532d76ae2262c9f0e79a1ae2ba26e9588dd15f8696a536b179b0f89a3d59fc9
                                                      • Instruction ID: 3735ebe6879db8ea29d8715b11182ca55d4418899c50ca066e1fdb09035c2ead
                                                      • Opcode Fuzzy Hash: 6532d76ae2262c9f0e79a1ae2ba26e9588dd15f8696a536b179b0f89a3d59fc9
                                                      • Instruction Fuzzy Hash: D53106305042455BEB265F2CD8447FA7BD8DB02B10F1841D9E8C597381EAFD8E8787A1
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00E03FD0,?,?,?,00000000), ref: 00E0315F
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 00E03168
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 8ae23a750a4facf96aa6ce76a76f913cdeb702a5d6e0cc0422a596de8f474aeb
                                                      • Instruction ID: c5a846b77f07ed1a63ae63e16d7d5130576bd400f14c90aa26a5080b8276716f
                                                      • Opcode Fuzzy Hash: 8ae23a750a4facf96aa6ce76a76f913cdeb702a5d6e0cc0422a596de8f474aeb
                                                      • Instruction Fuzzy Hash: 4CB09231044208EFDE002BA2EC09B883F28EB04762F50C210F64D950A08BA3549CCAA1
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(?,?,00E0167E,00E01633), ref: 00E0312F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: efb30208a39f4882cd1dc7bb840d82f44d041022d98ac1a5d4fad4e6dfc90cd4
                                                      • Instruction ID: 96b49768d1403871abe0bc4ccf622516346d7bec9ea12460484d4cafc7801fc9
                                                      • Opcode Fuzzy Hash: efb30208a39f4882cd1dc7bb840d82f44d041022d98ac1a5d4fad4e6dfc90cd4
                                                      • Instruction Fuzzy Hash: F4A0123000010CEBCE001B52EC044447F2CD7002507008010F40C410218773545485A0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a370402c8f36a930ee149746bf0578ec2ff8896c03207179a6bb8e52cd571a3d
                                                      • Instruction ID: e9481bd742ed380a984c310cd5df46cb97538498c70d4d7cee5188f0eeeaf462
                                                      • Opcode Fuzzy Hash: a370402c8f36a930ee149746bf0578ec2ff8896c03207179a6bb8e52cd571a3d
                                                      • Instruction Fuzzy Hash: 68722431C1026CCFDB84EF6EECA443677E1E744311B47072AAA816B1F5DAB4B624EB54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6f9c5fe904c489d02b3b7d9e900f18b990942105089b618e14aa1948d2f8417e
                                                      • Instruction ID: 864197d3d18e669f7748bb40b7949ac61832fb667389f660c12eb96559cc134d
                                                      • Opcode Fuzzy Hash: 6f9c5fe904c489d02b3b7d9e900f18b990942105089b618e14aa1948d2f8417e
                                                      • Instruction Fuzzy Hash: 8A721331D103BC8FEB88EF6ECCE443673A1E745391B47052AEB815B5A9D634B620EB54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70f8350f0bc9bb7423d88f710df3d79838e50089caad6667fa2a4da052bb2c9a
                                                      • Instruction ID: 6b34ed3766d3914dc491bf4f20ef00da459443006b0764cb8ca3dd2c25f02866
                                                      • Opcode Fuzzy Hash: 70f8350f0bc9bb7423d88f710df3d79838e50089caad6667fa2a4da052bb2c9a
                                                      • Instruction Fuzzy Hash: BF622431C042789FDB80DF6EEC8402673A6E744311B4E4726AB815B2B5DE7CB624EB75
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c4c5e297ccaa2e6a28d94ac4a99c0bb1d90e8d3fc4d8b6d6121cc56ea4fb8072
                                                      • Instruction ID: b9178d23fa1d18e34365cb11b232dab6d2c9566671c174b956080957120820ea
                                                      • Opcode Fuzzy Hash: c4c5e297ccaa2e6a28d94ac4a99c0bb1d90e8d3fc4d8b6d6121cc56ea4fb8072
                                                      • Instruction Fuzzy Hash: B962C631D046788FEB80DF6ECCC402673A2A74A351B4A4726EB905B2F9D63C7564EB74
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 186bebec836a3c904466e695e660aff9312295d36805ce3368992e7941ae0aab
                                                      • Instruction ID: c9a7e1a6bc1416237383f7dcbf5faa1dd633cb751b38bffc2c28c812b474e3de
                                                      • Opcode Fuzzy Hash: 186bebec836a3c904466e695e660aff9312295d36805ce3368992e7941ae0aab
                                                      • Instruction Fuzzy Hash: 7012DA70A101189FCB48CF6DD4919AABBF1FB4D300B4285AEE94ADB391CB71EA51DF50
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ad7c3b91ea077c504f33d54bc5dd0cc1295d74d4335e5fbadce14f44d3c6f4f7
                                                      • Instruction ID: 21e0bee45f58194022fee992da4ee3bb7d5da45b4afd13a44acffbf8f3a68135
                                                      • Opcode Fuzzy Hash: ad7c3b91ea077c504f33d54bc5dd0cc1295d74d4335e5fbadce14f44d3c6f4f7
                                                      • Instruction Fuzzy Hash: DE12D870A105689FDB48CF2DD4D09AABBF1FB4D340B4281AEE90ADB391C735AA51CB50
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction ID: 6cc74999f4c2fc34b04ab8ed7a327539a7fc8c56cc85c253eee546c5e78fb965
                                                      • Opcode Fuzzy Hash: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction Fuzzy Hash: 09D17971E002168FDB24CF58C880ABAB7F1FF58314F2945A9D855AB342E3B9ED51CB80
                                                      APIs
                                                        • Part of subcall function 00BB3D00: _memset.LIBCMT ref: 00BB3D52
                                                        • Part of subcall function 00BB3D00: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00BB3D76
                                                        • Part of subcall function 00BB3D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00BB3D7A
                                                        • Part of subcall function 00BB3D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00BB3D7E
                                                        • Part of subcall function 00BB3D00: VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00BB3DA5
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000040), ref: 00BB477F
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000100), ref: 00BB4795
                                                      • lstrcatW.KERNEL32(00000000,0063005C), ref: 00BB479D
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,?,00000000,00000000), ref: 00BB47B3
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB47C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$Virtual$AllocDirectoryExecuteFreeInfoShellSystemVerifyVersion_memsetlstrcat
                                                      • String ID: $ $ $ $.$.$/$/$\$\$a$a$a$b$c$d$d$e$e$e$e$h$i$l$l$m$m$m$n$o$open$p$s$s$t$u$w$w$x$x
                                                      • API String ID: 2684037697-4098772853
                                                      • Opcode ID: 265316e354c6173454986a7b35f45216d74e84e5b97e08764252637b8e617798
                                                      • Instruction ID: fd47593a6fa750b747cda48b403c55761efeea291362ce1261475eb86300d259
                                                      • Opcode Fuzzy Hash: 265316e354c6173454986a7b35f45216d74e84e5b97e08764252637b8e617798
                                                      • Instruction Fuzzy Hash: A94139B0548380DFE3608F119849B9BBFE6BB81B48F10491CF6985A291CBF6854CCF97
                                                      APIs
                                                        • Part of subcall function 00BB3D00: _memset.LIBCMT ref: 00BB3D52
                                                        • Part of subcall function 00BB3D00: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00BB3D76
                                                        • Part of subcall function 00BB3D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00BB3D7A
                                                        • Part of subcall function 00BB3D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00BB3D7E
                                                        • Part of subcall function 00BB3D00: VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00BB3DA5
                                                        • Part of subcall function 00BB3C80: AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00BB3CB0
                                                      • ExpandEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BB3E6D
                                                      • wsprintfW.USER32 ref: 00BB3F37
                                                      • VirtualAlloc.KERNEL32(00000000,0000003D,00003000,00000040), ref: 00BB3F4B
                                                      • GetForegroundWindow.USER32 ref: 00BB3F60
                                                      • ShellExecuteExW.SHELL32(00000000), ref: 00BB3FC1
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB3FD4
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00BB3FE6
                                                      • CloseHandle.KERNEL32(?), ref: 00BB3FEF
                                                      • ExitProcess.KERNEL32 ref: 00BB3FF7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$Virtual$AllocAllocateCloseEnvironmentExecuteExitExpandForegroundFreeHandleInfoInitializeObjectProcessShellSingleStringsVerifyVersionWaitWindow_memsetwsprintf
                                                      • String ID: $ $"$"$%$%$2$\$\$a$a$c$c$c$d$e$e$e$i$l$m$m$n$o$p$r$r$r$s$s$s$t$t$w$y
                                                      • API String ID: 561366689-3790645798
                                                      • Opcode ID: edb48c950c36929faeffe674dd53d09eba4c7b11819a8004c8082c7c24eaab07
                                                      • Instruction ID: 10c70df45bbc6f55189fbabec1256cc341473591c0f79b41b60529814b813c54
                                                      • Opcode Fuzzy Hash: edb48c950c36929faeffe674dd53d09eba4c7b11819a8004c8082c7c24eaab07
                                                      • Instruction Fuzzy Hash: 4C5149B0508340EFE3208F51D848B9ABFF9FF85748F004A1DE69896251DBFA9558CF96
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(00000000,00000010,00000000,00000000), ref: 00BB37C4
                                                      • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 00BB37CF
                                                      • VirtualAlloc.KERNEL32(00000000,00000401,00003000,00000040,00000000,00000000,00000000,?), ref: 00BB380A
                                                      • lstrcpyW.KERNEL32(00000000,00000000), ref: 00BB3828
                                                      • lstrcatW.KERNEL32(00000000,0043002E), ref: 00BB3833
                                                        • Part of subcall function 00BB8880: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00BB88A0
                                                        • Part of subcall function 00BB8880: VirtualAlloc.KERNEL32(00000000,00000007,00003000,00000040), ref: 00BB88C8
                                                        • Part of subcall function 00BB8880: GetModuleHandleA.KERNEL32(?), ref: 00BB891D
                                                        • Part of subcall function 00BB8880: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00BB892B
                                                        • Part of subcall function 00BB8880: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00BB893A
                                                        • Part of subcall function 00BB8880: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00BB895E
                                                        • Part of subcall function 00BB8880: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00BB896C
                                                        • Part of subcall function 00BB8880: CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00BB292B), ref: 00BB8980
                                                        • Part of subcall function 00BB8880: VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,?,?,00BB292B), ref: 00BB898E
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000004), ref: 00BB3896
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000004), ref: 00BB38C1
                                                        • Part of subcall function 00BB6770: EnterCriticalSection.KERNEL32(00BC3058,?,00BB38F4,00000000,00000000,00000000,?,00000800), ref: 00BB677B
                                                        • Part of subcall function 00BB6770: CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,?,00BB38F4,00000000,00000000,00000000), ref: 00BB67A1
                                                        • Part of subcall function 00BB6770: GetLastError.KERNEL32(?,00BB38F4,00000000,00000000,00000000), ref: 00BB67AB
                                                        • Part of subcall function 00BB6770: CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00BB38F4,00000000,00000000,00000000), ref: 00BB67C7
                                                        • Part of subcall function 00BB6770: LeaveCriticalSection.KERNEL32(00BC3058,?,00BB38F4,00000000,00000000,00000000), ref: 00BB67D6
                                                      • MessageBoxA.USER32(00000000,Fatal error: rsaenh.dll is not initialized as well,Fatal error,00000010), ref: 00BB390F
                                                      • GetLastError.KERNEL32 ref: 00BB3933
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00BB398D
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB3999
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB3BB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$ContextCryptFree$Alloc$Acquire$AttributesCriticalErrorFileLastReleaseSection$AddressEnterHandleLeaveLibraryLoadMessageModuleProclstrcatlstrcpy
                                                      • String ID: $.$B$Fatal error$Fatal error: rsaenh.dll is not initialized as well$R
                                                      • API String ID: 3050744578-4284454829
                                                      • Opcode ID: 13241cf238e69dd36f3cbce506236c34e981d8ca82122f71f3fcbcb696a123e5
                                                      • Instruction ID: 628978a97ff212ea6ae2142dd801059b7e53b8dbe6884a681588920ea02f4dc4
                                                      • Opcode Fuzzy Hash: 13241cf238e69dd36f3cbce506236c34e981d8ca82122f71f3fcbcb696a123e5
                                                      • Instruction Fuzzy Hash: 5FC11971E40309ABEB219B94DC46FEEBBB8EF48B00F204155F640BA190DBF56A44CF65
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000010,00000000,00000000,00BB6C13), ref: 00BB6A1C
                                                      • lstrlenW.KERNEL32(00000000), ref: 00BB6A21
                                                      • lstrcmpiW.KERNEL32(-00000004,desktop.ini), ref: 00BB6A4D
                                                      • lstrcmpiW.KERNEL32(-00000004,autorun.inf), ref: 00BB6A62
                                                      • lstrcmpiW.KERNEL32(-00000004,ntuser.dat), ref: 00BB6A6E
                                                      • lstrcmpiW.KERNEL32(-00000004,iconcache.db), ref: 00BB6A7A
                                                      • lstrcmpiW.KERNEL32(-00000004,bootsect.bak), ref: 00BB6A86
                                                      • lstrcmpiW.KERNEL32(-00000004,boot.ini), ref: 00BB6A92
                                                      • lstrcmpiW.KERNEL32(-00000004,ntuser.dat.log), ref: 00BB6A9E
                                                      • lstrcmpiW.KERNEL32(-00000004,thumbs.db), ref: 00BB6AAA
                                                      • lstrcmpiW.KERNEL32(-00000004,CRAB-DECRYPT.txt), ref: 00BB6AB6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmpi$lstrlen
                                                      • String ID: CRAB-DECRYPT.txt$autorun.inf$boot.ini$bootsect.bak$desktop.ini$iconcache.db$ntuser.dat$ntuser.dat.log$thumbs.db
                                                      • API String ID: 203586893-3936223242
                                                      • Opcode ID: b3826b32d36f7758543afd84cb364569efcc1a89a98699993fcecc88a4219aed
                                                      • Instruction ID: ca233b920e6bd98d283120b84f65aed6a8df04262cd37c70e619fc2c7fcea196
                                                      • Opcode Fuzzy Hash: b3826b32d36f7758543afd84cb364569efcc1a89a98699993fcecc88a4219aed
                                                      • Instruction Fuzzy Hash: 3A117C62641627675E21B67DDC01DFF63CCDED1B8430582B5EA00F20A5EBD9DE0389B1
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000201,00003000,00000040,00000000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB68BC
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB6914
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000002A,00000000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB697E
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000002B,00000000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB69A6
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000024,00000000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB69C4
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000,?,?,00000000,?,00BB6F26,00000000,?,?), ref: 00BB69E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FolderPathSpecial$Virtual$AllocFree
                                                      • String ID: Ransomware$\All Users\$\Boot\$\IETldCache\$\Local Settings\$\Program Files\$\ProgramData\$\Tor Browser\$\Windows\
                                                      • API String ID: 4167578076-3735464813
                                                      • Opcode ID: f5640c6f23b41443a9e01523fa677ad25c569d20b9ad43e8a66544662831e2f6
                                                      • Instruction ID: 104c26111a2ad365ae48a74aac6afa639e893ca63d10117b7fdd0197b4de20df
                                                      • Opcode Fuzzy Hash: f5640c6f23b41443a9e01523fa677ad25c569d20b9ad43e8a66544662831e2f6
                                                      • Instruction Fuzzy Hash: 4C317620B0061557EA2426664C56BFF53CECB95B44F1040F4EE86DB2CAEEF8CC0293E6
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7462
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB746D
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7483
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB748E
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74A4
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74AF
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74C5
                                                      • lstrlenW.KERNEL32(00BB4B46,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74D0
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74E6
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB74F1
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7507
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7512
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7531
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB753C
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7558
                                                      • lstrlenW.KERNEL32(?,?,?,?,00BB4829,00000000,?,00000000,00000000,?,00000000), ref: 00BB7566
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID:
                                                      • API String ID: 1659193697-0
                                                      • Opcode ID: 89475b979cd1e58bb29982286d29ea4d01db4ed9c87d55fd5a046d131ca7c689
                                                      • Instruction ID: 046af7be01c39bbcff5ce1d544ec3f1e97aa0927243614c7c6d0701f6893c509
                                                      • Opcode Fuzzy Hash: 89475b979cd1e58bb29982286d29ea4d01db4ed9c87d55fd5a046d131ca7c689
                                                      • Instruction Fuzzy Hash: 7B410C32640651FFC7116FB8DDC8798BBA2FF04316F884674E41683A60DBB5A878DB81
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000402,00003000,00000040,00000000,?,?,00000000,?,00BB6F5F,00000000,?,?), ref: 00BB6E65
                                                      • wsprintfW.USER32 ref: 00BB6E73
                                                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000001,00000080,00000000,?,?), ref: 00BB6E8F
                                                      • GetLastError.KERNEL32(?,?), ref: 00BB6E9C
                                                      • lstrlenW.KERNEL32(?,?,00000000,?,?), ref: 00BB6EBE
                                                      • WriteFile.KERNEL32(00000000,00000000,?,?), ref: 00BB6ECE
                                                      • CloseHandle.KERNEL32(00000000,?,?), ref: 00BB6ED5
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?), ref: 00BB6EE8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileVirtual$AllocCloseCreateErrorFreeHandleLastWritelstrlenwsprintf
                                                      • String ID: %s\CRAB-DECRYPT.txt
                                                      • API String ID: 2985722263-2724392667
                                                      • Opcode ID: 9f08795fcb2f0757d2cae3917ae09bb5a3dadbe07c486d570a4518868a7ebec3
                                                      • Instruction ID: 0f07bf8ad7a73c909e0509661a638a7b78599fbc7577c045dc2dc58453bc978d
                                                      • Opcode Fuzzy Hash: 9f08795fcb2f0757d2cae3917ae09bb5a3dadbe07c486d570a4518868a7ebec3
                                                      • Instruction Fuzzy Hash: 16019235740200BBE6601B68AD8AFBA3A9CEB46B15F100210FB05F61D0DEE9AD00866A
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,00000000,00000000,00BB5519,00000000,?,?,?,?,00BB5643,00000000,?,00000000), ref: 00BB5396
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB53A8
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000200,?,?,?,?,00BB5643,00000000,?,00000000,00000000,?,00000000), ref: 00BB53B8
                                                      • wsprintfW.USER32 ref: 00BB53C9
                                                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00BB53E3
                                                      • ExitProcess.KERNEL32 ref: 00BB53EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual$ExecuteExitFileModuleNameProcessShellwsprintf
                                                      • String ID: /c timeout -c 5 & del "%s" /f /q$cmd.exe$open
                                                      • API String ID: 4033023619-516011104
                                                      • Opcode ID: 7b8a6565ef8172cf2801776737ee9b45a5808a7924738a62aff76f401c6df5ec
                                                      • Instruction ID: 6f8b68f152be4851da9bb05cf911a4adc185bd6b550450c5b493a147922f3b05
                                                      • Opcode Fuzzy Hash: 7b8a6565ef8172cf2801776737ee9b45a5808a7924738a62aff76f401c6df5ec
                                                      • Instruction Fuzzy Hash: 82F03031BC171133F17117685C1FF672DA89B46F52F240154F709BF1D18DE054018AAE
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(?,?,00BB4817,00000000,?,00000000,00000000), ref: 00BB3C6C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID: hdd$os_bit$os_major$pc_group$pc_keyb$pc_lang$pc_name$pc_user$ransom_id
                                                      • API String ID: 54951025-631784635
                                                      • Opcode ID: d58b813c06a3cee2651ccbd422f3f4eab426f88fa8b91d6f8d2bdd484ceed0a3
                                                      • Instruction ID: a0be1f5273dbfc39c313b929913a3f54654389390e3efb798ca23d29af806b55
                                                      • Opcode Fuzzy Hash: d58b813c06a3cee2651ccbd422f3f4eab426f88fa8b91d6f8d2bdd484ceed0a3
                                                      • Instruction Fuzzy Hash: D0115DB5501B458FC7A0CF69C9846AABBF0BB08758B40496DE99AD7B10D3B1F448CF48
                                                      APIs
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7EF9
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F0B
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F1D
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F2F
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F41
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F53
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F65
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F77
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7F89
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00BB48BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00BB7FA1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 8314e05aada40d4ca2ccf08448e2df8d4d282001b4fe326b7a5ea45fbcf421e7
                                                      • Instruction ID: f81c5e96d3a81dab1604e552560c2d1e9704f02ac655ee92d3b7e97b726172f3
                                                      • Opcode Fuzzy Hash: 8314e05aada40d4ca2ccf08448e2df8d4d282001b4fe326b7a5ea45fbcf421e7
                                                      • Instruction Fuzzy Hash: ED219E30284B44ABE7765A15DC06BB576E1FF80B45F254968E2C1348F08BF57899DF48
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000018,00003000,00000004), ref: 00BB4020
                                                      • GetTickCount.KERNEL32 ref: 00BB4045
                                                      • GetDriveTypeW.KERNEL32(?), ref: 00BB406A
                                                      • CreateThread.KERNEL32(00000000,00000000,00BB70B0,?,00000000,00000000), ref: 00BB40A9
                                                      • WaitForMultipleObjects.KERNEL32(00000000,?), ref: 00BB40EB
                                                      • GetTickCount.KERNEL32 ref: 00BB40F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountTick$AllocCreateDriveMultipleObjectsThreadTypeVirtualWait
                                                      • String ID: ?:\
                                                      • API String ID: 458387131-2533537817
                                                      • Opcode ID: 872d3e398188838a9c06b6cfd71fbe5e5460f0692ac7ba0c8cc267a9bdb505f3
                                                      • Instruction ID: d2936a78ed123cf0075d772a46da3b65d24166c216bec197b02d1c719156f9e5
                                                      • Opcode Fuzzy Hash: 872d3e398188838a9c06b6cfd71fbe5e5460f0692ac7ba0c8cc267a9bdb505f3
                                                      • Instruction Fuzzy Hash: 3A5134709083009FD310DF18D884BAABBE5FF88314F504A6DFA89A7361D7B5A944CB96
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000401,00003000,00000040), ref: 00BB70C9
                                                      • wsprintfW.USER32 ref: 00BB70DE
                                                      • InitializeCriticalSection.KERNEL32(?), ref: 00BB70EC
                                                      • VirtualAlloc.KERNEL32 ref: 00BB7120
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00009C40,00003000,00000004), ref: 00BB714D
                                                      • ExitThread.KERNEL32 ref: 00BB7155
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$CriticalExitFreeInitializeSectionThreadwsprintf
                                                      • String ID: %c:\
                                                      • API String ID: 2059066847-3142399695
                                                      • Opcode ID: 7c370f18c0afd873ba652723727d695012c33ebc457b5338baf310e1fc18d311
                                                      • Instruction ID: 8c6b74f40aa5b61f89e6707d6b3d42be927e445212a2976d2516e1a354801080
                                                      • Opcode Fuzzy Hash: 7c370f18c0afd873ba652723727d695012c33ebc457b5338baf310e1fc18d311
                                                      • Instruction Fuzzy Hash: 3611C4B5544300BFE3509F54CC8AF667BA8AB45B11F004704FB64AA1D1DBF49500CBA6
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000010,00000000,00000000,?,00BB6BFA), ref: 00BB6AF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: %s
                                                      • API String ID: 1659193697-4273690596
                                                      • Opcode ID: 321b6c67fad7278b766b30ccdd9022a5d04c203e478a0e1dc2b5738795b97618
                                                      • Instruction ID: 8708b734b89ddccfd2f94483683492f8dfa4697b3668057f4aec4a679f320b84
                                                      • Opcode Fuzzy Hash: 321b6c67fad7278b766b30ccdd9022a5d04c203e478a0e1dc2b5738795b97618
                                                      • Instruction Fuzzy Hash: C1212172E012259BDB305B2C9C427F673F8EB95325F4482A6ED05E7180EBF89D41C390
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 00BB2C8A
                                                      • BeginPaint.USER32(?,?), ref: 00BB2C9F
                                                      • lstrlenW.KERNEL32(?), ref: 00BB2CAC
                                                      • TextOutW.GDI32(00000000,00000005,00000005,?,00000000), ref: 00BB2CBD
                                                      • EndPaint.USER32(?,?), ref: 00BB2CCB
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00002AD0,00000000,00000000,00000000), ref: 00BB2CE9
                                                      • DestroyWindow.USER32(?), ref: 00BB2CF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PaintWindow$BeginCreateDestroyProcTextThreadlstrlen
                                                      • String ID:
                                                      • API String ID: 572880375-0
                                                      • Opcode ID: 0d8181090cdbf3fcc8b4f57cf9c14fedf482740419bad536b71f6cc8939d5e74
                                                      • Instruction ID: d6a8f56880818505c5dbc9de51386ec7d53ef86447f1b601b1b75ba04904cc6a
                                                      • Opcode Fuzzy Hash: 0d8181090cdbf3fcc8b4f57cf9c14fedf482740419bad536b71f6cc8939d5e74
                                                      • Instruction Fuzzy Hash: EE115E32504209BBD711DF68DC0AFBA7BA8FB49711F004616FD45E61A0EBB19910DB92
                                                      APIs
                                                      • __init_pointers.LIBCMT ref: 00E01A4C
                                                        • Part of subcall function 00E01BFB: EncodePointer.KERNEL32(00000000,?,00E01A51,00E012AD,00E0FD50,00000014), ref: 00E01BFE
                                                        • Part of subcall function 00E01BFB: __initp_misc_winsig.LIBCMT ref: 00E01C19
                                                        • Part of subcall function 00E01BFB: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00E02EA5
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00E02EB9
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00E02ECC
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00E02EDF
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00E02EF2
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00E02F05
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00E02F18
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00E02F2B
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00E02F3E
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00E02F51
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00E02F64
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00E02F77
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00E02F8A
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00E02F9D
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00E02FB0
                                                        • Part of subcall function 00E01BFB: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00E02FC3
                                                      • __mtinitlocks.LIBCMT ref: 00E01A51
                                                      • __mtterm.LIBCMT ref: 00E01A5A
                                                        • Part of subcall function 00E01AC2: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00E01A5F,00E012AD,00E0FD50,00000014), ref: 00E031BB
                                                        • Part of subcall function 00E01AC2: _free.LIBCMT ref: 00E031C2
                                                        • Part of subcall function 00E01AC2: DeleteCriticalSection.KERNEL32(pP,?,?,00E01A5F,00E012AD,00E0FD50,00000014), ref: 00E031E4
                                                      • __calloc_crt.LIBCMT ref: 00E01A7F
                                                      • __initptd.LIBCMT ref: 00E01AA1
                                                      • GetCurrentThreadId.KERNEL32 ref: 00E01AA8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                      • String ID:
                                                      • API String ID: 3567560977-0
                                                      • Opcode ID: 49316563cc1fb7c8b29a21b8a9a445781e38bf96bd8657ec2f93dc38732d4752
                                                      • Instruction ID: e2f3e748bc4fb253e76e79b39c5d1ad28aa0ca98c4f89bc5c26a8e2fa2ce8e99
                                                      • Opcode Fuzzy Hash: 49316563cc1fb7c8b29a21b8a9a445781e38bf96bd8657ec2f93dc38732d4752
                                                      • Instruction Fuzzy Hash: BCF06D3261A7515EE224BBB57C0678B26E8AB017B9B20269EF660BD0D2FF1189C14190
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $.$B$R
                                                      • API String ID: 0-2564718622
                                                      • Opcode ID: c4397fe68df17939edc0105940fd75740397e122c90b7a27d9ab24e3aa98428a
                                                      • Instruction ID: 50346a21238b6942180f2da0544b5da8fee2da0f175e921cd3bcec0196503fc4
                                                      • Opcode Fuzzy Hash: c4397fe68df17939edc0105940fd75740397e122c90b7a27d9ab24e3aa98428a
                                                      • Instruction Fuzzy Hash: 37C11DB1E40318ABEB119B94CC46FEEBBB8FF49704F105115F640BA2D0DBB569948FA4
                                                      APIs
                                                      • lstrlenA.KERNEL32(00BB5474,00000000,?,00BB5475,?,00BB34BF,00BB5475,00000001,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB3251
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,00BB34BF,00BB5475,00000001,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB325B
                                                      • HeapAlloc.KERNEL32(00000000,?,00BB34BF,00BB5475,00000001,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB3262
                                                      • lstrlenA.KERNEL32(00BB5474,00000000,?,00BB5475,?,00BB34BF,00BB5475,00000001,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB3273
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,00BB34BF,00BB5475,00000001,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB327D
                                                      • HeapAlloc.KERNEL32(00000000,?,00BB34BF,00BB5475,00000001,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB3284
                                                      • lstrcpyA.KERNEL32(00000000,00BB5474,?,00BB34BF,00BB5475,00000001,00BB5475,00000000,00000000,00000000,?,?,00BB5474,00000000), ref: 00BB3293
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocProcesslstrlen$lstrcpy
                                                      • String ID:
                                                      • API String ID: 511007297-0
                                                      • Opcode ID: 5785967e425a0f0dad637735612c1bbbaf67a7b182f8970cf1a262d68e528d1e
                                                      • Instruction ID: c0567841a8639686dab1f4f55b9f3c716d2862e8e4ffa66277e3b6184f3dd3ef
                                                      • Opcode Fuzzy Hash: 5785967e425a0f0dad637735612c1bbbaf67a7b182f8970cf1a262d68e528d1e
                                                      • Instruction Fuzzy Hash: 8E1190308082946FDB611F6CD848BF6BBD8EF13B50F244296E9C5D7211CBB58D4687A2
                                                      APIs
                                                      • _memset.LIBCMT ref: 00BB3D52
                                                      • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00BB3D76
                                                      • VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00BB3D7A
                                                      • VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00BB3D7E
                                                      • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00BB3DA5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$InfoVerifyVersion_memset
                                                      • String ID:
                                                      • API String ID: 3299124433-0
                                                      • Opcode ID: ce2a42939653c626c55946bc191be169b17e80c6344bda28126cd1c69655041d
                                                      • Instruction ID: c5af721c8bc6a877ee0afdd770b777004da9ad1f40b439ed234d5099d32f0f6f
                                                      • Opcode Fuzzy Hash: ce2a42939653c626c55946bc191be169b17e80c6344bda28126cd1c69655041d
                                                      • Instruction Fuzzy Hash: 05111EB0D4031C6EEB719F64DC0ABEA7ABCEB08700F0081D9A608E71C1D6B45B948FD5
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,00E01B1E,00000000,?,00E04E28,000000FF,0000001E,00000000,00000000,00000000,?,00E03385), ref: 00E01AEE
                                                      • GetProcAddress.KERNEL32(?,CorExitProcess), ref: 00E01B00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 1646373207-1276376045
                                                      • Opcode ID: 9d4e9582c801e36fdfa61eb56d6dd6cb0f4baf87f6649244dd37d57c103b6268
                                                      • Instruction ID: 6f713044fa527d053017a453f37ae6527882d8b5e8bdd2f3da233e5ace8d882b
                                                      • Opcode Fuzzy Hash: 9d4e9582c801e36fdfa61eb56d6dd6cb0f4baf87f6649244dd37d57c103b6268
                                                      • Instruction Fuzzy Hash: 3DD01230340208FBDB215B96DC06F697B7DEB04746F101298F904F50D0EB629E94DA60
                                                      APIs
                                                      • lstrcpyA.KERNEL32(?,fabian wosar <3,?,00BB5218), ref: 00BB4F23
                                                      • lstrlenA.KERNEL32(00000000,?,00BB5218), ref: 00BB4F7F
                                                      • lstrcpyA.KERNEL32(?,?,?,00BB5218), ref: 00BB4FAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen
                                                      • String ID: fabian wosar <3
                                                      • API String ID: 367037083-1724090804
                                                      • Opcode ID: 6917693300857f17e9079d508a50438060845ee4c234bb5cdff83846b304cc2b
                                                      • Instruction ID: 4e2fc984ddbc7e322445796b77f3f3178f28c1c10278e6b55f1675f4ae9b42d8
                                                      • Opcode Fuzzy Hash: 6917693300857f17e9079d508a50438060845ee4c234bb5cdff83846b304cc2b
                                                      • Instruction Fuzzy Hash: F831ED218082A59BDF228F6C98507FABFE1FF43745F6811DAD8D99721BD7E18846C390
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00E073B0
                                                      • __isleadbyte_l.LIBCMT ref: 00E073DE
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000), ref: 00E0740C
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000), ref: 00E07442
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 8fab9fe81dcfd28424b4f936f5b847a95221475551e65d1c362ff959717044c8
                                                      • Instruction ID: b08fe04fae7803f171694886f1f8712439ee6d24950ae1ac07d03ee3a72bbc64
                                                      • Opcode Fuzzy Hash: 8fab9fe81dcfd28424b4f936f5b847a95221475551e65d1c362ff959717044c8
                                                      • Instruction Fuzzy Hash: B731C130A08246AFDB218F65CC45BAA7FE5FF40314F155529E8A4A71E1E730F8D0EB50
                                                      APIs
                                                      • _free.LIBCMT ref: 00E04EAC
                                                        • Part of subcall function 00E04DFB: __FF_MSGBANNER.LIBCMT ref: 00E04E12
                                                        • Part of subcall function 00E04DFB: __NMSG_WRITE.LIBCMT ref: 00E04E19
                                                        • Part of subcall function 00E04DFB: HeapAlloc.KERNEL32(00FA0000,00000000,00000001,00000000,00000000,00000000,?,00E03385,00000000,00000000,00000000,00000000,?,00E0323A,00000018,00E0FE20), ref: 00E04E3E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocHeap_free
                                                      • String ID:
                                                      • API String ID: 1080816511-0
                                                      • Opcode ID: 81882f9aee01dd6954c753e02282d26078e63ccd807e4e39f1cbd643b2024d13
                                                      • Instruction ID: f9b7130a012610fcb446d3d078558ebdcd793690707b9f845bef36814c7f34b4
                                                      • Opcode Fuzzy Hash: 81882f9aee01dd6954c753e02282d26078e63ccd807e4e39f1cbd643b2024d13
                                                      • Instruction Fuzzy Hash: BF11A3F2904216AFCB313FB5FE0569A37D4AF40364B207126FF44BA1E1DA3588D096E5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: ed737c6f3f553842245351af73272b28864018b3ad26054dfff4ed908eda36ec
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: 6F017B3200114EBBDF125E84CE818EE7F72BB19394B589515FA9868072C736C9F1AB92
                                                      APIs
                                                      • lstrcmpiA.KERNEL32(00BB5474,mask), ref: 00BB31B9
                                                      • lstrcmpiA.KERNEL32(00BB5474,pub_key), ref: 00BB31D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791139432.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmpi
                                                      • String ID: mask$pub_key
                                                      • API String ID: 1586166983-1355590148
                                                      • Opcode ID: c8c08ea4cc54db6e456cbc0d40f2e83b40bf7c5b90bec5f5fcbc5e661b5a8518
                                                      • Instruction ID: e99539f8400b01ca1e8863f167077567bd8e71cf253a7b2476e31a6f3dbbe734
                                                      • Opcode Fuzzy Hash: c8c08ea4cc54db6e456cbc0d40f2e83b40bf7c5b90bec5f5fcbc5e661b5a8518
                                                      • Instruction Fuzzy Hash: 41F046723082841FE7194A6C9C857F1BBCCDB05B00F9401BFF689C2190D6FA8C81C350
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E029CC
                                                      • ___raise_securityfailure.LIBCMT ref: 00E02AB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor___raise_securityfailure
                                                      • String ID: @M
                                                      • API String ID: 3761405300-2208089455
                                                      • Opcode ID: 1ebc8a753b531519b232eca6b5484240aeed96c9bf6cf1925c65108d997cbba7
                                                      • Instruction ID: 3456bab06bbe346db633d137bd365370ecd907e10edea75b9bcfed7fbfa73a7c
                                                      • Opcode Fuzzy Hash: 1ebc8a753b531519b232eca6b5484240aeed96c9bf6cf1925c65108d997cbba7
                                                      • Instruction Fuzzy Hash: 7D21EDF59002089FE721DF56FD867547BE4BB08310F56606AEA08AF3E0E7B1598A8F45
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2791285958.0000000000E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E00000, based on PE: true
                                                      • Associated: 00000000.00000002.2791252862.0000000000E00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791318792.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791359211.0000000000E11000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2791395923.0000000000E27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e00000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __calloc_crt
                                                      • String ID: `R
                                                      • API String ID: 3494438863-1244114338
                                                      • Opcode ID: 944a9d667d6547103449f5ebce6bc9516829cdeb801c3fedcf27aa64e8522c60
                                                      • Instruction ID: 581cba5c14a10c5cd4b2a36248f78cda973418372f6e1441558c09c5122667c7
                                                      • Opcode Fuzzy Hash: 944a9d667d6547103449f5ebce6bc9516829cdeb801c3fedcf27aa64e8522c60
                                                      • Instruction Fuzzy Hash: A2F0C2F2249302CEF7348B2ABE41BA167D8E716764B58611BE700FA5E5E7308CC28780

                                                      Execution Graph

                                                      Execution Coverage:3.7%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:1522
                                                      Total number of Limit Nodes:76
                                                      execution_graph 9734 fd123b 9735 fd1247 __mtinitlocknum 9734->9735 9769 fd1de0 GetProcessHeap 9735->9769 9737 fd129c 9738 fd12a7 9737->9738 9863 fd138f 9737->9863 9770 fd1a4c 9738->9770 9741 fd12ad 9742 fd12b8 __RTC_Initialize 9741->9742 9743 fd138f _fast_error_exit 58 API calls 9741->9743 9791 fd1df5 9742->9791 9743->9742 9745 fd12c7 9746 fd12d3 GetCommandLineA 9745->9746 9747 fd138f _fast_error_exit 58 API calls 9745->9747 9810 fd26fc GetEnvironmentStringsW 9746->9810 9749 fd12d2 9747->9749 9749->9746 9753 fd12f8 9834 fd22d8 9753->9834 9757 fd1309 9850 fd1b63 9757->9850 9758 fd1b29 __lock 58 API calls 9758->9757 9760 fd1311 9761 fd131c 9760->9761 9762 fd1b29 __lock 58 API calls 9760->9762 9856 fd11a8 OpenProcess GetLastError 9761->9856 9762->9761 9769->9737 9878 fd1bfb EncodePointer 9770->9878 9772 fd1a51 9883 fd32a1 9772->9883 9775 fd1a5a 9887 fd1ac2 9775->9887 9780 fd1a77 9899 fd3327 9780->9899 9783 fd1ab9 9784 fd1ac2 __mtterm 61 API calls 9783->9784 9786 fd1abe 9784->9786 9786->9741 9787 fd1a98 9787->9783 9788 fd1a9e 9787->9788 9908 fd1999 9788->9908 9790 fd1aa6 GetCurrentThreadId 9790->9741 9792 fd1e01 __mtinitlocknum 9791->9792 9793 fd3170 __lock 58 API calls 9792->9793 9794 fd1e08 9793->9794 9795 fd3327 __calloc_crt 58 API calls 9794->9795 9797 fd1e19 9795->9797 9796 fd1e84 GetStartupInfoW 9804 fd1e99 9796->9804 9805 fd1fc8 9796->9805 9797->9796 9798 fd1e24 __mtinitlocknum @_EH4_CallFilterFunc@8 9797->9798 9798->9745 9799 fd2090 10170 fd20a0 9799->10170 9801 fd3327 __calloc_crt 58 API calls 9801->9804 9802 fd2015 GetStdHandle 9802->9805 9803 fd2028 GetFileType 9803->9805 9804->9801 9804->9805 9806 fd1ee7 9804->9806 9805->9799 9805->9802 9805->9803 9809 fd2e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9805->9809 9806->9805 9807 fd1f1b GetFileType 9806->9807 9808 fd2e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9806->9808 9807->9806 9808->9806 9809->9805 9811 fd270f WideCharToMultiByte 9810->9811 9816 fd12e3 9810->9816 9813 fd2779 FreeEnvironmentStringsW 9811->9813 9814 fd2742 9811->9814 9813->9816 9815 fd336f __malloc_crt 58 API calls 9814->9815 9817 fd2748 9815->9817 9823 fd20a9 9816->9823 9817->9813 9818 fd274f WideCharToMultiByte 9817->9818 9819 fd276e FreeEnvironmentStringsW 9818->9819 9820 fd2765 9818->9820 9819->9816 9821 fd32ef _free 58 API calls 9820->9821 9822 fd276b 9821->9822 9822->9819 9824 fd20bc GetModuleFileNameA 9823->9824 9825 fd20b7 9823->9825 9827 fd20e9 9824->9827 10180 fd375a 9825->10180 10174 fd215c 9827->10174 9829 fd12ed 9829->9753 9871 fd1b29 9829->9871 9831 fd336f __malloc_crt 58 API calls 9832 fd2122 9831->9832 9832->9829 9833 fd215c _parse_cmdline 58 API calls 9832->9833 9833->9829 9835 fd22e1 9834->9835 9837 fd22e6 _strlen 9834->9837 9836 fd375a ___initmbctable 71 API calls 9835->9836 9836->9837 9838 fd3327 __calloc_crt 58 API calls 9837->9838 9841 fd12fe 9837->9841 9846 fd231c _strlen 9838->9846 9839 fd236e 9840 fd32ef _free 58 API calls 9839->9840 9840->9841 9841->9757 9841->9758 9842 fd3327 __calloc_crt 58 API calls 9842->9846 9843 fd2395 9844 fd32ef _free 58 API calls 9843->9844 9844->9841 9846->9839 9846->9841 9846->9842 9846->9843 9847 fd23ac 9846->9847 10600 fd4942 9846->10600 9848 fd4041 __invoke_watson 8 API calls 9847->9848 9849 fd23b8 9848->9849 9852 fd1b6f __IsNonwritableInCurrentImage 9850->9852 10609 fd4381 9852->10609 9853 fd1b8d __initterm_e 9855 fd1bac _doexit __IsNonwritableInCurrentImage 9853->9855 10612 fd436c 9853->10612 9855->9760 9857 fd120a 9856->9857 9858 fd1203 9856->9858 10678 fd1113 9857->10678 9859 fd1204 ExitProcess 9858->9859 9862 fd1234 ExitThread 9864 fd139b 9863->9864 9865 fd13a0 9863->9865 9866 fd23b9 __FF_MSGBANNER 58 API calls 9864->9866 9867 fd2416 __NMSG_WRITE 58 API calls 9865->9867 9866->9865 9868 fd13a8 9867->9868 9869 fd1b13 __mtinitlocknum 3 API calls 9868->9869 9870 fd13b2 9869->9870 9870->9738 9872 fd23b9 __FF_MSGBANNER 58 API calls 9871->9872 9873 fd1b31 9872->9873 9874 fd2416 __NMSG_WRITE 58 API calls 9873->9874 9875 fd1b39 9874->9875 11509 fd1be7 9875->11509 9879 fd1c0c __init_pointers __initp_misc_winsig 9878->9879 9918 fd2d9f EncodePointer 9879->9918 9881 fd1c24 __init_pointers 9882 fd2e9e 34 API calls 9881->9882 9882->9772 9884 fd32ad 9883->9884 9886 fd1a56 9884->9886 9919 fd2e2e 9884->9919 9886->9775 9896 fd2db0 9886->9896 9888 fd1acc 9887->9888 9890 fd1ad2 9887->9890 9922 fd2dce 9888->9922 9891 fd31ba DeleteCriticalSection 9890->9891 9892 fd31d6 9890->9892 9925 fd32ef 9891->9925 9894 fd31e2 DeleteCriticalSection 9892->9894 9895 fd1a5f 9892->9895 9894->9892 9895->9741 9897 fd2dc7 TlsAlloc 9896->9897 9898 fd1a6c 9896->9898 9898->9775 9898->9780 9902 fd332e 9899->9902 9901 fd1a84 9901->9783 9905 fd2e0c 9901->9905 9902->9901 9904 fd334c 9902->9904 9951 fd4f38 9902->9951 9904->9901 9904->9902 9959 fd3137 Sleep 9904->9959 9906 fd2e26 TlsSetValue 9905->9906 9907 fd2e22 9905->9907 9906->9787 9907->9787 9909 fd19a5 __mtinitlocknum 9908->9909 9962 fd3170 9909->9962 9911 fd19e2 9969 fd1a3a 9911->9969 9914 fd3170 __lock 58 API calls 9915 fd1a03 ___addlocaleref 9914->9915 9972 fd1a43 9915->9972 9917 fd1a2e __mtinitlocknum 9917->9790 9918->9881 9920 fd2e3e 9919->9920 9921 fd2e4b InitializeCriticalSectionAndSpinCount 9919->9921 9920->9884 9921->9884 9923 fd2de5 TlsFree 9922->9923 9924 fd2de1 9922->9924 9923->9890 9924->9890 9926 fd32f8 HeapFree 9925->9926 9930 fd3321 __dosmaperr 9925->9930 9927 fd330d 9926->9927 9926->9930 9931 fd40a0 9927->9931 9930->9890 9934 fd192a GetLastError 9931->9934 9933 fd3313 GetLastError 9933->9930 9948 fd2ded 9934->9948 9936 fd193f 9937 fd198d SetLastError 9936->9937 9938 fd3327 __calloc_crt 55 API calls 9936->9938 9937->9933 9939 fd1952 9938->9939 9939->9937 9940 fd2e0c __getptd_noexit TlsSetValue 9939->9940 9941 fd1966 9940->9941 9942 fd196c 9941->9942 9943 fd1984 9941->9943 9944 fd1999 __initptd 55 API calls 9942->9944 9945 fd32ef _free 55 API calls 9943->9945 9946 fd1974 GetCurrentThreadId 9944->9946 9947 fd198a 9945->9947 9946->9937 9947->9937 9949 fd2e04 TlsGetValue 9948->9949 9950 fd2e00 9948->9950 9949->9936 9950->9936 9952 fd4f43 9951->9952 9957 fd4f5e 9951->9957 9953 fd4f4f 9952->9953 9952->9957 9954 fd40a0 __calloc_impl 57 API calls 9953->9954 9956 fd4f54 9954->9956 9955 fd4f6e HeapAlloc 9955->9956 9955->9957 9956->9902 9957->9955 9957->9956 9960 fd43a0 DecodePointer 9957->9960 9959->9904 9961 fd43b3 9960->9961 9961->9957 9963 fd3194 EnterCriticalSection 9962->9963 9964 fd3181 9962->9964 9963->9911 9975 fd31f8 9964->9975 9966 fd3187 9966->9963 9967 fd1b29 __lock 57 API calls 9966->9967 9968 fd3193 9967->9968 9968->9963 10168 fd32da LeaveCriticalSection 9969->10168 9971 fd19fc 9971->9914 10169 fd32da LeaveCriticalSection 9972->10169 9974 fd1a4a 9974->9917 9976 fd3204 __mtinitlocknum 9975->9976 9990 fd3223 9976->9990 9997 fd23b9 9976->9997 9983 fd3241 9987 fd40a0 __calloc_impl 58 API calls 9983->9987 9984 fd3250 9985 fd3170 __lock 58 API calls 9984->9985 9989 fd3257 9985->9989 9988 fd3246 __mtinitlocknum 9987->9988 9988->9966 9991 fd327c 9989->9991 9992 fd3264 9989->9992 9990->9988 10039 fd336f 9990->10039 9994 fd32ef _free 58 API calls 9991->9994 9993 fd2e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9992->9993 9995 fd3270 9993->9995 9994->9995 10045 fd3298 9995->10045 10048 fd25e0 9997->10048 9999 fd23c0 10000 fd25e0 __NMSG_WRITE 58 API calls 9999->10000 10004 fd23cd 9999->10004 10000->10004 10001 fd2416 __NMSG_WRITE 58 API calls 10002 fd23e5 10001->10002 10005 fd2416 __NMSG_WRITE 58 API calls 10002->10005 10003 fd23ef 10006 fd2416 10003->10006 10004->10001 10004->10003 10005->10003 10007 fd2434 __NMSG_WRITE 10006->10007 10008 fd25e0 __NMSG_WRITE 55 API calls 10007->10008 10035 fd255b 10007->10035 10010 fd2447 10008->10010 10012 fd2560 GetStdHandle 10010->10012 10013 fd25e0 __NMSG_WRITE 55 API calls 10010->10013 10011 fd25c4 10036 fd1b13 10011->10036 10016 fd256e _strlen 10012->10016 10012->10035 10014 fd2458 10013->10014 10014->10012 10015 fd246a 10014->10015 10015->10035 10078 fd4a97 10015->10078 10018 fd25a7 WriteFile 10016->10018 10016->10035 10018->10035 10020 fd25c8 10023 fd4041 __invoke_watson 8 API calls 10020->10023 10021 fd2497 GetModuleFileNameW 10022 fd24b7 10021->10022 10027 fd24c7 __NMSG_WRITE 10021->10027 10024 fd4a97 __NMSG_WRITE 55 API calls 10022->10024 10025 fd25d2 10023->10025 10024->10027 10026 fd250d 10026->10020 10096 fd4a2b 10026->10096 10027->10020 10027->10026 10087 fd4b0c 10027->10087 10031 fd4a2b __NMSG_WRITE 55 API calls 10032 fd2544 10031->10032 10032->10020 10033 fd254b 10032->10033 10105 fd4bca EncodePointer 10033->10105 10130 fd13c0 10035->10130 10145 fd1adf GetModuleHandleExW 10036->10145 10041 fd337d 10039->10041 10042 fd323a 10041->10042 10044 fd3390 10041->10044 10148 fd4dfb 10041->10148 10042->9983 10042->9984 10044->10041 10044->10042 10166 fd3137 Sleep 10044->10166 10167 fd32da LeaveCriticalSection 10045->10167 10047 fd329f 10047->9988 10049 fd25ea 10048->10049 10050 fd25f4 10049->10050 10051 fd40a0 __calloc_impl 58 API calls 10049->10051 10050->9999 10052 fd2610 10051->10052 10055 fd4031 10052->10055 10058 fd4006 DecodePointer 10055->10058 10059 fd4019 10058->10059 10064 fd4041 IsProcessorFeaturePresent 10059->10064 10062 fd4006 __cftoa_l 8 API calls 10063 fd261b 10062->10063 10063->9999 10065 fd404c 10064->10065 10070 fd3ed2 10065->10070 10069 fd4030 10069->10062 10071 fd3eec ___raise_securityfailure _memset 10070->10071 10072 fd3f0c IsDebuggerPresent 10071->10072 10073 fd315a ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter 10072->10073 10076 fd3fd0 ___raise_securityfailure 10073->10076 10074 fd13c0 __setmbcp_nolock 6 API calls 10075 fd3ff3 10074->10075 10077 fd3145 GetCurrentProcess TerminateProcess 10075->10077 10076->10074 10077->10069 10079 fd4ab0 10078->10079 10080 fd4aa2 10078->10080 10081 fd40a0 __calloc_impl 58 API calls 10079->10081 10080->10079 10084 fd4ac9 10080->10084 10086 fd4aba 10081->10086 10082 fd4031 __cftoa_l 9 API calls 10083 fd248a 10082->10083 10083->10020 10083->10021 10084->10083 10085 fd40a0 __calloc_impl 58 API calls 10084->10085 10085->10086 10086->10082 10091 fd4b1a 10087->10091 10088 fd4b1e 10089 fd4b23 10088->10089 10090 fd40a0 __calloc_impl 58 API calls 10088->10090 10089->10026 10092 fd4b4e 10090->10092 10091->10088 10091->10089 10094 fd4b5d 10091->10094 10093 fd4031 __cftoa_l 9 API calls 10092->10093 10093->10089 10094->10089 10095 fd40a0 __calloc_impl 58 API calls 10094->10095 10095->10092 10097 fd4a45 10096->10097 10099 fd4a37 10096->10099 10098 fd40a0 __calloc_impl 58 API calls 10097->10098 10104 fd4a4f 10098->10104 10099->10097 10102 fd4a71 10099->10102 10100 fd4031 __cftoa_l 9 API calls 10101 fd252d 10100->10101 10101->10020 10101->10031 10102->10101 10103 fd40a0 __calloc_impl 58 API calls 10102->10103 10103->10104 10104->10100 10106 fd4bfe ___crtIsPackagedApp 10105->10106 10107 fd4cbd IsDebuggerPresent 10106->10107 10108 fd4c0d LoadLibraryExW 10106->10108 10109 fd4cc7 10107->10109 10110 fd4ce2 10107->10110 10111 fd4c4a GetProcAddress 10108->10111 10112 fd4c24 GetLastError 10108->10112 10113 fd4cce OutputDebugStringW 10109->10113 10114 fd4cd5 10109->10114 10110->10114 10115 fd4ce7 DecodePointer 10110->10115 10117 fd4c5e 7 API calls 10111->10117 10120 fd4cda 10111->10120 10116 fd4c33 LoadLibraryExW 10112->10116 10112->10120 10113->10114 10114->10120 10124 fd4d0e DecodePointer DecodePointer 10114->10124 10128 fd4d26 10114->10128 10115->10120 10116->10111 10116->10120 10118 fd4cba 10117->10118 10119 fd4ca6 GetProcAddress EncodePointer 10117->10119 10118->10107 10119->10118 10121 fd13c0 __setmbcp_nolock 6 API calls 10120->10121 10126 fd4dac 10121->10126 10122 fd4d5e DecodePointer 10123 fd4d4a DecodePointer 10122->10123 10127 fd4d65 10122->10127 10123->10120 10124->10128 10126->10035 10127->10123 10129 fd4d76 DecodePointer 10127->10129 10128->10122 10128->10123 10129->10123 10131 fd13c8 10130->10131 10132 fd13ca IsProcessorFeaturePresent 10130->10132 10131->10011 10134 fd29d5 10132->10134 10137 fd2984 IsDebuggerPresent 10134->10137 10138 fd2999 ___raise_securityfailure 10137->10138 10143 fd315a SetUnhandledExceptionFilter UnhandledExceptionFilter 10138->10143 10141 fd29a1 ___raise_securityfailure 10144 fd3145 GetCurrentProcess TerminateProcess 10141->10144 10142 fd29be 10142->10011 10143->10141 10144->10142 10146 fd1b0a ExitProcess 10145->10146 10147 fd1af8 GetProcAddress 10145->10147 10147->10146 10149 fd4e07 10148->10149 10150 fd4e76 10148->10150 10152 fd4e12 10149->10152 10151 fd43a0 __calloc_impl DecodePointer 10150->10151 10153 fd4e7c 10151->10153 10152->10149 10154 fd23b9 __FF_MSGBANNER 57 API calls 10152->10154 10156 fd4e3a HeapAlloc 10152->10156 10157 fd2416 __NMSG_WRITE 57 API calls 10152->10157 10160 fd4e62 10152->10160 10161 fd43a0 __calloc_impl DecodePointer 10152->10161 10163 fd1b13 __mtinitlocknum 3 API calls 10152->10163 10164 fd4e60 10152->10164 10155 fd40a0 __calloc_impl 57 API calls 10153->10155 10154->10152 10159 fd4e82 10155->10159 10156->10152 10158 fd4e6e 10156->10158 10157->10152 10158->10159 10159->10041 10162 fd40a0 __calloc_impl 57 API calls 10160->10162 10161->10152 10162->10164 10163->10152 10165 fd40a0 __calloc_impl 57 API calls 10164->10165 10165->10158 10166->10044 10167->10047 10168->9971 10169->9974 10173 fd32da LeaveCriticalSection 10170->10173 10172 fd20a7 10172->9798 10173->10172 10176 fd217e 10174->10176 10179 fd21e2 10176->10179 10184 fd492c 10176->10184 10177 fd20ff 10177->9829 10177->9831 10178 fd492c _parse_cmdline 58 API calls 10178->10179 10179->10177 10179->10178 10181 fd376a 10180->10181 10182 fd3763 10180->10182 10181->9824 10488 fd3b3f 10182->10488 10187 fd48d2 10184->10187 10190 fd3778 10187->10190 10189 fd48e4 10189->10176 10191 fd37d6 10190->10191 10192 fd3789 10190->10192 10191->10189 10198 fd1912 10192->10198 10195 fd37b6 10195->10191 10218 fd3a99 10195->10218 10199 fd192a __getptd_noexit 58 API calls 10198->10199 10200 fd1918 10199->10200 10201 fd1925 10200->10201 10202 fd1b29 __lock 58 API calls 10200->10202 10201->10195 10203 fd368f 10201->10203 10202->10201 10204 fd369b __mtinitlocknum 10203->10204 10205 fd1912 __setmbcp 58 API calls 10204->10205 10206 fd36a4 10205->10206 10207 fd36d3 10206->10207 10208 fd36b7 10206->10208 10209 fd3170 __lock 58 API calls 10207->10209 10210 fd1912 __setmbcp 58 API calls 10208->10210 10211 fd36da 10209->10211 10213 fd36bc 10210->10213 10230 fd370f 10211->10230 10216 fd36ca __mtinitlocknum 10213->10216 10217 fd1b29 __lock 58 API calls 10213->10217 10216->10195 10217->10216 10219 fd3aa5 __mtinitlocknum 10218->10219 10220 fd1912 __setmbcp 58 API calls 10219->10220 10221 fd3aaf 10220->10221 10222 fd3ac1 10221->10222 10223 fd3170 __lock 58 API calls 10221->10223 10224 fd3acf __mtinitlocknum 10222->10224 10226 fd1b29 __lock 58 API calls 10222->10226 10228 fd3adf 10223->10228 10224->10191 10225 fd3b0c 10484 fd3b36 10225->10484 10226->10224 10228->10225 10229 fd32ef _free 58 API calls 10228->10229 10229->10225 10231 fd371a ___addlocaleref ___removelocaleref 10230->10231 10233 fd36ee 10230->10233 10231->10233 10237 fd3495 10231->10237 10234 fd3706 10233->10234 10483 fd32da LeaveCriticalSection 10234->10483 10236 fd370d 10236->10213 10238 fd350e 10237->10238 10239 fd34aa 10237->10239 10240 fd355b 10238->10240 10241 fd32ef _free 58 API calls 10238->10241 10239->10238 10242 fd34db 10239->10242 10249 fd32ef _free 58 API calls 10239->10249 10252 fd3584 10240->10252 10307 fd5115 10240->10307 10244 fd352f 10241->10244 10246 fd34f9 10242->10246 10257 fd32ef _free 58 API calls 10242->10257 10247 fd32ef _free 58 API calls 10244->10247 10248 fd32ef _free 58 API calls 10246->10248 10253 fd3542 10247->10253 10254 fd3503 10248->10254 10255 fd34d0 10249->10255 10250 fd32ef _free 58 API calls 10250->10252 10251 fd35e3 10256 fd32ef _free 58 API calls 10251->10256 10252->10251 10262 fd32ef 58 API calls _free 10252->10262 10258 fd32ef _free 58 API calls 10253->10258 10261 fd32ef _free 58 API calls 10254->10261 10267 fd4fb2 10255->10267 10264 fd35e9 10256->10264 10259 fd34ee 10257->10259 10260 fd3550 10258->10260 10295 fd50ae 10259->10295 10266 fd32ef _free 58 API calls 10260->10266 10261->10238 10262->10252 10264->10233 10266->10240 10268 fd4fc1 10267->10268 10294 fd50aa 10267->10294 10269 fd32ef _free 58 API calls 10268->10269 10270 fd4fd2 10268->10270 10269->10270 10271 fd4fe4 10270->10271 10272 fd32ef _free 58 API calls 10270->10272 10273 fd4ff6 10271->10273 10274 fd32ef _free 58 API calls 10271->10274 10272->10271 10275 fd5008 10273->10275 10276 fd32ef _free 58 API calls 10273->10276 10274->10273 10277 fd501a 10275->10277 10278 fd32ef _free 58 API calls 10275->10278 10276->10275 10279 fd502c 10277->10279 10280 fd32ef _free 58 API calls 10277->10280 10278->10277 10281 fd503e 10279->10281 10282 fd32ef _free 58 API calls 10279->10282 10280->10279 10283 fd5050 10281->10283 10284 fd32ef _free 58 API calls 10281->10284 10282->10281 10285 fd5062 10283->10285 10286 fd32ef _free 58 API calls 10283->10286 10284->10283 10287 fd5074 10285->10287 10288 fd32ef _free 58 API calls 10285->10288 10286->10285 10289 fd5086 10287->10289 10290 fd32ef _free 58 API calls 10287->10290 10288->10287 10291 fd5098 10289->10291 10292 fd32ef _free 58 API calls 10289->10292 10290->10289 10293 fd32ef _free 58 API calls 10291->10293 10291->10294 10292->10291 10293->10294 10294->10242 10296 fd50b9 10295->10296 10306 fd5111 10295->10306 10297 fd50c9 10296->10297 10298 fd32ef _free 58 API calls 10296->10298 10299 fd32ef _free 58 API calls 10297->10299 10300 fd50db 10297->10300 10298->10297 10299->10300 10301 fd50ed 10300->10301 10303 fd32ef _free 58 API calls 10300->10303 10302 fd50ff 10301->10302 10304 fd32ef _free 58 API calls 10301->10304 10305 fd32ef _free 58 API calls 10302->10305 10302->10306 10303->10301 10304->10302 10305->10306 10306->10246 10308 fd5124 10307->10308 10482 fd3579 10307->10482 10309 fd32ef _free 58 API calls 10308->10309 10310 fd512c 10309->10310 10311 fd32ef _free 58 API calls 10310->10311 10312 fd5134 10311->10312 10313 fd32ef _free 58 API calls 10312->10313 10314 fd513c 10313->10314 10315 fd32ef _free 58 API calls 10314->10315 10316 fd5144 10315->10316 10317 fd32ef _free 58 API calls 10316->10317 10318 fd514c 10317->10318 10319 fd32ef _free 58 API calls 10318->10319 10320 fd5154 10319->10320 10321 fd32ef _free 58 API calls 10320->10321 10322 fd515b 10321->10322 10323 fd32ef _free 58 API calls 10322->10323 10324 fd5163 10323->10324 10325 fd32ef _free 58 API calls 10324->10325 10326 fd516b 10325->10326 10327 fd32ef _free 58 API calls 10326->10327 10328 fd5173 10327->10328 10329 fd32ef _free 58 API calls 10328->10329 10330 fd517b 10329->10330 10331 fd32ef _free 58 API calls 10330->10331 10332 fd5183 10331->10332 10333 fd32ef _free 58 API calls 10332->10333 10334 fd518b 10333->10334 10335 fd32ef _free 58 API calls 10334->10335 10336 fd5193 10335->10336 10337 fd32ef _free 58 API calls 10336->10337 10338 fd519b 10337->10338 10339 fd32ef _free 58 API calls 10338->10339 10340 fd51a3 10339->10340 10341 fd32ef _free 58 API calls 10340->10341 10342 fd51ae 10341->10342 10343 fd32ef _free 58 API calls 10342->10343 10344 fd51b6 10343->10344 10345 fd32ef _free 58 API calls 10344->10345 10346 fd51be 10345->10346 10347 fd32ef _free 58 API calls 10346->10347 10348 fd51c6 10347->10348 10349 fd32ef _free 58 API calls 10348->10349 10350 fd51ce 10349->10350 10351 fd32ef _free 58 API calls 10350->10351 10352 fd51d6 10351->10352 10353 fd32ef _free 58 API calls 10352->10353 10354 fd51de 10353->10354 10355 fd32ef _free 58 API calls 10354->10355 10356 fd51e6 10355->10356 10357 fd32ef _free 58 API calls 10356->10357 10358 fd51ee 10357->10358 10359 fd32ef _free 58 API calls 10358->10359 10360 fd51f6 10359->10360 10361 fd32ef _free 58 API calls 10360->10361 10362 fd51fe 10361->10362 10363 fd32ef _free 58 API calls 10362->10363 10364 fd5206 10363->10364 10365 fd32ef _free 58 API calls 10364->10365 10366 fd520e 10365->10366 10367 fd32ef _free 58 API calls 10366->10367 10368 fd5216 10367->10368 10369 fd32ef _free 58 API calls 10368->10369 10370 fd521e 10369->10370 10371 fd32ef _free 58 API calls 10370->10371 10372 fd5226 10371->10372 10373 fd32ef _free 58 API calls 10372->10373 10374 fd5234 10373->10374 10375 fd32ef _free 58 API calls 10374->10375 10376 fd523f 10375->10376 10377 fd32ef _free 58 API calls 10376->10377 10378 fd524a 10377->10378 10379 fd32ef _free 58 API calls 10378->10379 10380 fd5255 10379->10380 10381 fd32ef _free 58 API calls 10380->10381 10382 fd5260 10381->10382 10383 fd32ef _free 58 API calls 10382->10383 10384 fd526b 10383->10384 10385 fd32ef _free 58 API calls 10384->10385 10386 fd5276 10385->10386 10387 fd32ef _free 58 API calls 10386->10387 10388 fd5281 10387->10388 10389 fd32ef _free 58 API calls 10388->10389 10390 fd528c 10389->10390 10391 fd32ef _free 58 API calls 10390->10391 10392 fd5297 10391->10392 10393 fd32ef _free 58 API calls 10392->10393 10394 fd52a2 10393->10394 10395 fd32ef _free 58 API calls 10394->10395 10396 fd52ad 10395->10396 10397 fd32ef _free 58 API calls 10396->10397 10398 fd52b8 10397->10398 10399 fd32ef _free 58 API calls 10398->10399 10400 fd52c3 10399->10400 10401 fd32ef _free 58 API calls 10400->10401 10402 fd52ce 10401->10402 10403 fd32ef _free 58 API calls 10402->10403 10404 fd52d9 10403->10404 10405 fd32ef _free 58 API calls 10404->10405 10406 fd52e7 10405->10406 10407 fd32ef _free 58 API calls 10406->10407 10408 fd52f2 10407->10408 10409 fd32ef _free 58 API calls 10408->10409 10410 fd52fd 10409->10410 10411 fd32ef _free 58 API calls 10410->10411 10412 fd5308 10411->10412 10413 fd32ef _free 58 API calls 10412->10413 10414 fd5313 10413->10414 10415 fd32ef _free 58 API calls 10414->10415 10416 fd531e 10415->10416 10417 fd32ef _free 58 API calls 10416->10417 10418 fd5329 10417->10418 10419 fd32ef _free 58 API calls 10418->10419 10420 fd5334 10419->10420 10421 fd32ef _free 58 API calls 10420->10421 10422 fd533f 10421->10422 10423 fd32ef _free 58 API calls 10422->10423 10424 fd534a 10423->10424 10425 fd32ef _free 58 API calls 10424->10425 10426 fd5355 10425->10426 10427 fd32ef _free 58 API calls 10426->10427 10428 fd5360 10427->10428 10429 fd32ef _free 58 API calls 10428->10429 10430 fd536b 10429->10430 10431 fd32ef _free 58 API calls 10430->10431 10432 fd5376 10431->10432 10433 fd32ef _free 58 API calls 10432->10433 10434 fd5381 10433->10434 10435 fd32ef _free 58 API calls 10434->10435 10436 fd538c 10435->10436 10437 fd32ef _free 58 API calls 10436->10437 10438 fd539a 10437->10438 10439 fd32ef _free 58 API calls 10438->10439 10440 fd53a5 10439->10440 10441 fd32ef _free 58 API calls 10440->10441 10442 fd53b0 10441->10442 10443 fd32ef _free 58 API calls 10442->10443 10444 fd53bb 10443->10444 10445 fd32ef _free 58 API calls 10444->10445 10446 fd53c6 10445->10446 10447 fd32ef _free 58 API calls 10446->10447 10448 fd53d1 10447->10448 10449 fd32ef _free 58 API calls 10448->10449 10450 fd53dc 10449->10450 10451 fd32ef _free 58 API calls 10450->10451 10452 fd53e7 10451->10452 10453 fd32ef _free 58 API calls 10452->10453 10454 fd53f2 10453->10454 10455 fd32ef _free 58 API calls 10454->10455 10456 fd53fd 10455->10456 10457 fd32ef _free 58 API calls 10456->10457 10458 fd5408 10457->10458 10459 fd32ef _free 58 API calls 10458->10459 10460 fd5413 10459->10460 10461 fd32ef _free 58 API calls 10460->10461 10462 fd541e 10461->10462 10463 fd32ef _free 58 API calls 10462->10463 10464 fd5429 10463->10464 10465 fd32ef _free 58 API calls 10464->10465 10466 fd5434 10465->10466 10467 fd32ef _free 58 API calls 10466->10467 10468 fd543f 10467->10468 10469 fd32ef _free 58 API calls 10468->10469 10470 fd544d 10469->10470 10471 fd32ef _free 58 API calls 10470->10471 10472 fd5458 10471->10472 10473 fd32ef _free 58 API calls 10472->10473 10474 fd5463 10473->10474 10475 fd32ef _free 58 API calls 10474->10475 10476 fd546e 10475->10476 10477 fd32ef _free 58 API calls 10476->10477 10478 fd5479 10477->10478 10479 fd32ef _free 58 API calls 10478->10479 10480 fd5484 10479->10480 10481 fd32ef _free 58 API calls 10480->10481 10481->10482 10482->10250 10483->10236 10487 fd32da LeaveCriticalSection 10484->10487 10486 fd3b3d 10486->10222 10487->10486 10489 fd3b4b __mtinitlocknum 10488->10489 10490 fd1912 __setmbcp 58 API calls 10489->10490 10491 fd3b53 10490->10491 10492 fd3a99 __setmbcp 58 API calls 10491->10492 10493 fd3b5d 10492->10493 10513 fd383a 10493->10513 10496 fd336f __malloc_crt 58 API calls 10497 fd3b7f 10496->10497 10498 fd3cac __mtinitlocknum 10497->10498 10520 fd3ce7 10497->10520 10498->10181 10501 fd3bd5 10501->10498 10508 fd3170 __lock 58 API calls 10501->10508 10502 fd3bb5 10502->10501 10505 fd32ef _free 58 API calls 10502->10505 10503 fd3cbc 10503->10498 10504 fd3ccf 10503->10504 10506 fd32ef _free 58 API calls 10503->10506 10507 fd40a0 __calloc_impl 58 API calls 10504->10507 10505->10501 10506->10504 10507->10498 10509 fd3c04 10508->10509 10510 fd3c92 10509->10510 10512 fd32ef _free 58 API calls 10509->10512 10530 fd3cb1 10510->10530 10512->10510 10514 fd3778 _LocaleUpdate::_LocaleUpdate 58 API calls 10513->10514 10515 fd384a 10514->10515 10516 fd3859 GetOEMCP 10515->10516 10517 fd386b 10515->10517 10519 fd3882 10516->10519 10518 fd3870 GetACP 10517->10518 10517->10519 10518->10519 10519->10496 10519->10498 10521 fd383a getSystemCP 60 API calls 10520->10521 10522 fd3d04 10521->10522 10525 fd3d55 IsValidCodePage 10522->10525 10527 fd3d0b setSBCS 10522->10527 10529 fd3d7a _memset __setmbcp_nolock 10522->10529 10523 fd13c0 __setmbcp_nolock 6 API calls 10524 fd3ba6 10523->10524 10524->10502 10524->10503 10526 fd3d67 GetCPInfo 10525->10526 10525->10527 10526->10527 10526->10529 10527->10523 10533 fd3907 GetCPInfo 10529->10533 10599 fd32da LeaveCriticalSection 10530->10599 10532 fd3cb8 10532->10498 10534 fd39e9 10533->10534 10540 fd393f 10533->10540 10536 fd13c0 __setmbcp_nolock 6 API calls 10534->10536 10539 fd3a95 10536->10539 10539->10527 10543 fd57f5 10540->10543 10542 fd5699 ___crtLCMapStringA 63 API calls 10542->10534 10544 fd3778 _LocaleUpdate::_LocaleUpdate 58 API calls 10543->10544 10545 fd5806 10544->10545 10553 fd56fd 10545->10553 10548 fd5699 10549 fd3778 _LocaleUpdate::_LocaleUpdate 58 API calls 10548->10549 10550 fd56aa 10549->10550 10570 fd5495 10550->10570 10554 fd5724 MultiByteToWideChar 10553->10554 10555 fd5717 10553->10555 10557 fd5750 10554->10557 10565 fd5749 10554->10565 10555->10554 10556 fd13c0 __setmbcp_nolock 6 API calls 10558 fd39a0 10556->10558 10559 fd5772 _memset __alloca_probe_16 10557->10559 10561 fd4dfb __crtGetStringTypeA_stat 58 API calls 10557->10561 10558->10548 10560 fd57ae MultiByteToWideChar 10559->10560 10559->10565 10562 fd57d8 10560->10562 10563 fd57c8 GetStringTypeW 10560->10563 10561->10559 10566 fd56df 10562->10566 10563->10562 10565->10556 10567 fd56e9 10566->10567 10568 fd56fa 10566->10568 10567->10568 10569 fd32ef _free 58 API calls 10567->10569 10568->10565 10569->10568 10571 fd54ae MultiByteToWideChar 10570->10571 10573 fd550d 10571->10573 10577 fd5514 10571->10577 10574 fd13c0 __setmbcp_nolock 6 API calls 10573->10574 10575 fd39c1 10574->10575 10575->10542 10576 fd5573 MultiByteToWideChar 10578 fd55da 10576->10578 10579 fd558c 10576->10579 10580 fd4dfb __crtGetStringTypeA_stat 58 API calls 10577->10580 10583 fd553c __alloca_probe_16 10577->10583 10582 fd56df __freea 58 API calls 10578->10582 10595 fd5982 10579->10595 10580->10583 10582->10573 10583->10573 10583->10576 10584 fd55a0 10584->10578 10585 fd55b6 10584->10585 10587 fd55e2 10584->10587 10585->10578 10586 fd5982 __crtLCMapStringA_stat 2 API calls 10585->10586 10586->10578 10590 fd4dfb __crtGetStringTypeA_stat 58 API calls 10587->10590 10593 fd560a __alloca_probe_16 10587->10593 10588 fd5982 __crtLCMapStringA_stat 2 API calls 10589 fd564d 10588->10589 10591 fd5675 10589->10591 10594 fd5667 WideCharToMultiByte 10589->10594 10590->10593 10592 fd56df __freea 58 API calls 10591->10592 10592->10578 10593->10578 10593->10588 10594->10591 10596 fd59ad __crtLCMapStringA_stat 10595->10596 10597 fd5992 LCMapStringEx 10595->10597 10598 fd59c4 LCMapStringW 10596->10598 10597->10584 10598->10584 10599->10532 10601 fd495b 10600->10601 10602 fd494d 10600->10602 10603 fd40a0 __calloc_impl 58 API calls 10601->10603 10602->10601 10604 fd4971 10602->10604 10608 fd4962 10603->10608 10606 fd496c 10604->10606 10607 fd40a0 __calloc_impl 58 API calls 10604->10607 10605 fd4031 __cftoa_l 9 API calls 10605->10606 10606->9846 10607->10608 10608->10605 10610 fd4384 EncodePointer 10609->10610 10610->10610 10611 fd439e 10610->10611 10611->9853 10615 fd4270 10612->10615 10614 fd4377 10614->9855 10616 fd427c __mtinitlocknum 10615->10616 10623 fd1c8b 10616->10623 10622 fd42a3 __mtinitlocknum 10622->10614 10624 fd3170 __lock 58 API calls 10623->10624 10625 fd1c92 10624->10625 10626 fd42b4 DecodePointer DecodePointer 10625->10626 10627 fd42e1 10626->10627 10628 fd4291 10626->10628 10627->10628 10640 fd58d0 10627->10640 10637 fd42ae 10628->10637 10630 fd4344 EncodePointer EncodePointer 10630->10628 10631 fd4318 10631->10628 10634 fd33b6 __realloc_crt 61 API calls 10631->10634 10636 fd4332 EncodePointer 10631->10636 10632 fd42f3 10632->10630 10632->10631 10647 fd33b6 10632->10647 10635 fd432c 10634->10635 10635->10628 10635->10636 10636->10630 10674 fd1c94 10637->10674 10641 fd58ee HeapSize 10640->10641 10642 fd58d9 10640->10642 10641->10632 10643 fd40a0 __calloc_impl 58 API calls 10642->10643 10644 fd58de 10643->10644 10645 fd4031 __cftoa_l 9 API calls 10644->10645 10646 fd58e9 10645->10646 10646->10632 10650 fd33bd 10647->10650 10649 fd33fa 10649->10631 10650->10649 10652 fd4e8d 10650->10652 10673 fd3137 Sleep 10650->10673 10653 fd4e96 10652->10653 10654 fd4ea1 10652->10654 10656 fd4dfb __crtGetStringTypeA_stat 58 API calls 10653->10656 10655 fd4ea9 10654->10655 10665 fd4eb6 10654->10665 10658 fd32ef _free 58 API calls 10655->10658 10657 fd4e9e 10656->10657 10657->10650 10670 fd4eb1 __dosmaperr 10658->10670 10659 fd4eee 10661 fd43a0 __calloc_impl DecodePointer 10659->10661 10660 fd4ebe HeapReAlloc 10660->10665 10660->10670 10662 fd4ef4 10661->10662 10663 fd40a0 __calloc_impl 58 API calls 10662->10663 10663->10670 10664 fd4f1e 10667 fd40a0 __calloc_impl 58 API calls 10664->10667 10665->10659 10665->10660 10665->10664 10666 fd43a0 __calloc_impl DecodePointer 10665->10666 10669 fd4f06 10665->10669 10666->10665 10668 fd4f23 GetLastError 10667->10668 10668->10670 10671 fd40a0 __calloc_impl 58 API calls 10669->10671 10670->10650 10672 fd4f0b GetLastError 10671->10672 10672->10670 10673->10650 10677 fd32da LeaveCriticalSection 10674->10677 10676 fd1c9b 10676->10622 10677->10676 10679 fd111f 10678->10679 10680 fd1186 10679->10680 10681 fd1136 VirtualProtect 10679->10681 10698 fdb4e8 10680->10698 10681->10680 10682 fd1156 10681->10682 10688 fe75c0 10682->10688 10684 fd11a7 10684->9859 10684->9862 10689 fe75e2 10688->10689 10690 fe760e GetPEB 10689->10690 10691 fe77c5 VirtualAlloc 10690->10691 10696 fe7628 10690->10696 10693 fe77ec 10691->10693 10692 fe7857 LoadLibraryA 10692->10693 10693->10692 10694 fe78c6 10693->10694 10701 f94dd0 10694->10701 10696->10691 10699 fd13c0 __setmbcp_nolock 6 API calls 10698->10699 10700 fdb4f2 10699->10700 10700->10700 10702 f94de9 VirtualProtect 10701->10702 10703 f94ded CreateThread 10701->10703 10702->10680 10703->10702 10704 f94e0b CloseHandle 10703->10704 10705 f94b30 Sleep 10703->10705 10704->10702 10750 f947e0 10705->10750 10708 f94b4a ExitProcess 10709 f94b52 CreateThread 10710 f94b9c 10709->10710 10711 f94b70 WaitForSingleObject 10709->10711 11398 f92d30 10709->11398 10766 f948d0 CreateToolhelp32Snapshot VirtualAlloc 10710->10766 10712 f94b92 CloseHandle 10711->10712 10713 f94b86 TerminateThread 10711->10713 10712->10710 10713->10712 10715 f94ba1 10777 f942c0 10715->10777 10719 f94bae 10720 f94bfc VirtualAlloc 10719->10720 10727 f94c4b 10719->10727 10722 f94c19 GetModuleFileNameW 10720->10722 10723 f94c43 ExitProcess 10720->10723 10721 f94c85 10729 f94cf8 10721->10729 10730 f94caf lstrlenA VirtualAlloc CryptStringToBinaryA 10721->10730 10800 f93dc0 10722->10800 10727->10721 10728 f94c6f Sleep 10727->10728 10811 f958d0 10727->10811 10728->10727 10864 f94210 10729->10864 10730->10729 10732 f94cf0 ExitProcess 10730->10732 10733 f94d04 InitializeCriticalSection 10734 f94d22 10733->10734 10735 f94d15 10733->10735 10873 f94000 VirtualAlloc GetTickCount 10734->10873 10867 f941e0 10735->10867 10739 f94d2a DeleteCriticalSection 10881 f93c80 AllocateAndInitializeSid 10739->10881 10741 f94d3a 10742 f94d43 VirtualAlloc 10741->10742 10885 f945c0 10741->10885 10744 f94d8a 10742->10744 10745 f94d60 GetModuleFileNameW 10742->10745 10746 f94dad ExitThread 10744->10746 10747 f94d93 ShellExecuteW 10744->10747 10748 f93dc0 17 API calls 10745->10748 10747->10746 10749 f94d79 VirtualFree 10748->10749 10749->10744 10892 f93bd0 GetProcessHeap 10750->10892 10752 f94817 10893 f97600 10752->10893 10756 f94829 VirtualAlloc 10757 f94848 lstrcpyW lstrlenW 10756->10757 10979 f97210 10757->10979 10760 f94879 CreateMutexW GetLastError 10761 f9489a VirtualFree 10760->10761 10762 f94891 GetLastError 10760->10762 11005 f97ee0 10761->11005 10762->10761 10767 f94a68 10766->10767 10770 f94a7b 10766->10770 10768 f94a73 Process32FirstW 10767->10768 10767->10770 10768->10770 10769 f94a90 lstrcmpiW 10769->10770 10771 f94a9f OpenProcess 10769->10771 10770->10769 10772 f94ad4 Process32NextW 10770->10772 10771->10770 10773 f94ab1 TerminateProcess CloseHandle 10771->10773 10772->10770 10774 f94ae7 10772->10774 10773->10770 10775 f94af9 CloseHandle 10774->10775 10776 f94aeb VirtualFree 10774->10776 10775->10715 10776->10775 10778 f945a8 10777->10778 10779 f942db 10777->10779 10797 f96660 VirtualAlloc VirtualAlloc 10778->10797 11077 f93bd0 GetProcessHeap 10779->11077 10781 f94306 10782 f97600 98 API calls 10781->10782 10783 f94312 10782->10783 10784 f97410 16 API calls 10783->10784 10785 f9431e VirtualAlloc 10784->10785 10786 f94342 10785->10786 10787 f97210 49 API calls 10786->10787 10788 f94360 10787->10788 10789 f9436c lstrlenW 10788->10789 10796 f943a0 10789->10796 10790 f94466 10792 f94588 VirtualFree 10790->10792 10793 f94557 VirtualAlloc 10790->10793 10791 f943f0 lstrcpyW lstrlenW 10791->10790 10791->10796 10795 f97ee0 10 API calls 10792->10795 10793->10792 10794 f94574 wsprintfW 10793->10794 10794->10792 10795->10778 10796->10790 10796->10791 11078 f964f0 CryptAcquireContextW 10797->11078 11086 f93d00 10800->11086 10802 f93dd6 10803 f93fda VirtualFree 10802->10803 10804 f93c80 4 API calls 10802->10804 10803->10723 10805 f93de3 10804->10805 10805->10803 10806 f93deb ExpandEnvironmentStringsW wsprintfW VirtualAlloc GetForegroundWindow 10805->10806 10807 f93fc0 ShellExecuteExW 10806->10807 10808 f93fe1 WaitForSingleObject CloseHandle ExitProcess 10807->10808 10809 f93fc7 10807->10809 10809->10807 10810 f93fcd VirtualFree 10809->10810 10810->10803 11091 f98130 GetTickCount 10811->11091 10815 f95939 10816 f97600 98 API calls 10815->10816 10817 f95942 10816->10817 10818 f97410 16 API calls 10817->10818 10819 f9594b VirtualAlloc 10818->10819 10820 f9598f 10819->10820 10821 f95e8b 10820->10821 10822 f959fd 6 API calls 10820->10822 10824 f95ea0 10821->10824 10825 f95e96 VirtualFree 10821->10825 10823 f95a7e lstrlenA 10822->10823 10828 f95aa5 lstrlenA 10823->10828 10827 f95ea5 VirtualFree 10824->10827 10825->10824 10830 f97ee0 10 API calls 10827->10830 10831 f95af2 lstrlenA 10828->10831 10836 f95ac3 lstrlenA 10828->10836 10832 f95ebc 10830->10832 10833 f95b21 lstrcatW lstrlenW 10831->10833 10841 f95afb lstrlenA 10831->10841 10832->10727 10835 f97210 49 API calls 10833->10835 10839 f95b4b 10835->10839 10837 f95aee 10836->10837 10837->10831 11103 f935c0 VirtualAlloc 10839->11103 10841->10833 10842 f95b68 18 API calls 10844 f95cca lstrlenW 10842->10844 10846 f95cfb lstrlenW VirtualAlloc 10844->10846 10847 f95ced VirtualFree 10844->10847 10848 f95d1d wsprintfA 10846->10848 10849 f95d30 10846->10849 10847->10846 10848->10849 11114 f96010 VirtualAlloc 10849->11114 10852 f95d6b GetLastError 10853 f95d71 lstrlenA VirtualAlloc lstrlenA 10852->10853 10854 f95d99 lstrlenA 10853->10854 10856 f95dde lstrlenA MultiByteToWideChar 10854->10856 10860 f95db2 lstrlenA 10854->10860 11123 f95520 10856->11123 10860->10856 10861 f95e1b VirtualFree VirtualFree VirtualFree 10861->10827 10862 f95e4d VirtualFree VirtualFree VirtualFree 10862->10821 10865 f9421d VirtualAlloc 10864->10865 10866 f94238 10864->10866 10865->10866 10866->10733 10866->10866 10868 f941f4 10867->10868 10869 f94000 417 API calls 10868->10869 10870 f941fc 10869->10870 11244 f96730 VirtualFree VirtualFree 10870->11244 10872 f94204 10872->10739 10874 f94060 GetDriveTypeW 10873->10874 10875 f94075 10874->10875 10875->10874 10876 f9407a CreateThread 10875->10876 10877 f940be WaitForMultipleObjects GetTickCount 10875->10877 10876->10875 11279 f970b0 VirtualAlloc wsprintfW InitializeCriticalSection VirtualAlloc 10876->11279 10878 f9411f 10877->10878 10878->10878 11245 f956a0 10878->11245 10880 f941cd 10880->10739 10882 f93cba 10881->10882 10883 f93cbe GetModuleHandleA GetProcAddress 10881->10883 10882->10741 10884 f93ce0 FreeSid 10883->10884 10884->10741 10886 f93d00 4 API calls 10885->10886 10887 f945d4 VirtualAlloc 10886->10887 10889 f9478b 10887->10889 10890 f9478f GetSystemDirectoryW lstrcatW ShellExecuteW 10887->10890 10891 f947bf VirtualFree 10889->10891 10890->10891 10891->10742 10892->10752 10894 f97619 VirtualAlloc GetUserNameW 10893->10894 10895 f9763e 10893->10895 10894->10895 10896 f97644 VirtualAlloc GetComputerNameW 10895->10896 10897 f97666 10895->10897 10896->10897 10898 f97672 VirtualAlloc 10897->10898 10899 f976c6 10897->10899 10898->10899 10900 f97689 10898->10900 10901 f976d0 VirtualAlloc RegOpenKeyExW 10899->10901 10902 f97765 10899->10902 11026 f97580 RegOpenKeyExW 10900->11026 10903 f9770c RegQueryValueExW 10901->10903 10904 f9774e VirtualFree 10901->10904 10905 f97869 10902->10905 10906 f9776f VirtualAlloc VirtualAlloc 10902->10906 10908 f97739 GetLastError 10903->10908 10909 f97730 10903->10909 10904->10902 10910 f978cb 10905->10910 10911 f9786f VirtualAlloc 10905->10911 10912 f977a4 wsprintfW RegOpenKeyExW 10906->10912 10914 f9773f RegCloseKey 10908->10914 10909->10914 10917 f9793e 10910->10917 10918 f978d1 GetNativeSystemInfo VirtualAlloc 10910->10918 10915 f97580 5 API calls 10911->10915 10916 f977d9 RegQueryValueExW 10912->10916 10922 f977fb 10912->10922 10913 f976a4 10913->10899 10925 f976c1 wsprintfW 10913->10925 10914->10902 10914->10904 10921 f9789d 10915->10921 10916->10922 10923 f97804 GetLastError 10916->10923 10919 f9795f 10917->10919 10920 f97944 10917->10920 10924 f978f4 10918->10924 10931 f97917 wsprintfW 10918->10931 10929 f97969 VirtualAlloc VirtualAlloc GetWindowsDirectoryW GetVolumeInformationW 10919->10929 10936 f97aa9 10919->10936 11031 f97ce0 VirtualAlloc VirtualAlloc 10920->11031 10921->10910 10937 f97580 5 API calls 10921->10937 10922->10912 10926 f97846 wsprintfW VirtualFree 10922->10926 10930 f9780a RegCloseKey 10922->10930 10923->10930 10924->10931 10932 f97902 wsprintfW ExitProcess 10924->10932 10925->10899 10926->10905 10934 f97580 5 API calls 10929->10934 10930->10922 10935 f97819 lstrcmpiW 10930->10935 10931->10917 10933 f97958 10933->10919 10941 f979f5 10934->10941 10935->10922 10935->10932 10938 f97ab9 VirtualAlloc 10936->10938 10939 f97c62 10936->10939 10940 f978be wsprintfW 10937->10940 10959 f97b10 10938->10959 10942 f97c6b VirtualAlloc 10939->10942 10943 f94820 10939->10943 10940->10910 10944 f979f9 lstrlenW 10941->10944 10945 f97a2a wsprintfW lstrcatW GetModuleHandleW GetProcAddress 10941->10945 10946 f97c89 10942->10946 10947 f97ca6 10942->10947 10961 f97410 10943->10961 10948 f97580 5 API calls 10944->10948 10949 f97a84 VirtualFree 10945->10949 10950 f97a6d lstrlenW 10945->10950 11049 f97160 10946->11049 10947->10943 10948->10945 10949->10936 10950->10949 10953 f97b32 GetDriveTypeW 10953->10959 10955 f97c94 VirtualFree 10955->10947 10956 f97b59 lstrcatW lstrcatW lstrcatW GetDiskFreeSpaceW 10958 f97c33 lstrcatW 10956->10958 10956->10959 10957 f97c53 lstrlenW 10957->10939 10958->10959 10959->10953 10959->10956 10959->10957 10960 f97bcc lstrlenW wsprintfW lstrlenW wsprintfW lstrcatW 10959->10960 10960->10959 10962 f97420 10961->10962 10963 f9747a 10962->10963 10964 f9745f lstrlenW lstrlenW 10962->10964 10965 f9749b 10963->10965 10966 f97480 lstrlenW lstrlenW 10963->10966 10964->10963 10967 f974bc 10965->10967 10968 f974a1 lstrlenW lstrlenW 10965->10968 10966->10965 10969 f974dd 10967->10969 10970 f974c2 lstrlenW lstrlenW 10967->10970 10968->10967 10971 f974fe 10969->10971 10972 f974e3 lstrlenW lstrlenW 10969->10972 10970->10969 10973 f97504 lstrlenW lstrlenW 10971->10973 10974 f9751f 10971->10974 10972->10971 10973->10974 10975 f97549 10974->10975 10976 f9752e lstrlenW lstrlenW 10974->10976 10977 f97552 lstrlenW lstrlenW 10975->10977 10978 f97577 10975->10978 10976->10975 10977->10756 10978->10756 10980 f9722a lstrcatW lstrcatW lstrcatW lstrcatW 10979->10980 10981 f9724c 10979->10981 10980->10981 10982 f9726d 10981->10982 10983 f97251 lstrcatW lstrcatW lstrcatW lstrcatW 10981->10983 10984 f9728f 10982->10984 10985 f97273 lstrcatW lstrcatW lstrcatW lstrcatW 10982->10985 10983->10982 10986 f972b1 10984->10986 10987 f97295 lstrcatW lstrcatW lstrcatW lstrcatW 10984->10987 10985->10984 10988 f972d3 10986->10988 10989 f972b7 lstrcatW lstrcatW lstrcatW lstrcatW 10986->10989 10987->10986 10990 f972d9 lstrcatW lstrcatW lstrcatW lstrcatW 10988->10990 10991 f972f5 10988->10991 10989->10988 10990->10991 10992 f972fb lstrcatW lstrcatW lstrcatW lstrcatW 10991->10992 10993 f97317 10991->10993 10992->10993 10994 f97339 10993->10994 10995 f9731d lstrcatW lstrcatW lstrcatW lstrcatW 10993->10995 10996 f9735b 10994->10996 10997 f9733f lstrcatW lstrcatW lstrcatW lstrcatW 10994->10997 10995->10994 10998 f973cc 10996->10998 10999 f97361 VirtualAlloc 10996->10999 10997->10996 11000 f973ee lstrlenW 10998->11000 11001 f973d2 lstrcatW lstrcatW lstrcatW lstrcatW 10998->11001 11002 f9737c wsprintfW 10999->11002 11003 f97391 wsprintfW 10999->11003 11000->10760 11001->11000 11004 f973a0 lstrcatW lstrcatW lstrcatW lstrcatW VirtualFree 11002->11004 11003->11004 11004->10998 11006 f97efb 11005->11006 11007 f97eef VirtualFree 11005->11007 11008 f97f0d 11006->11008 11009 f97f01 VirtualFree 11006->11009 11007->11006 11010 f97f1f 11008->11010 11011 f97f13 VirtualFree 11008->11011 11009->11008 11012 f97f31 11010->11012 11013 f97f25 VirtualFree 11010->11013 11011->11010 11014 f97f43 11012->11014 11015 f97f37 VirtualFree 11012->11015 11013->11012 11016 f97f49 VirtualFree 11014->11016 11017 f97f55 11014->11017 11015->11014 11016->11017 11018 f97f5b VirtualFree 11017->11018 11019 f97f67 11017->11019 11018->11019 11020 f97f79 11019->11020 11021 f97f6d VirtualFree 11019->11021 11022 f97f8b 11020->11022 11023 f97f7f VirtualFree 11020->11023 11021->11020 11024 f948ba 11022->11024 11025 f97f94 VirtualFree 11022->11025 11023->11022 11024->10708 11024->10709 11025->11024 11027 f975ee 11026->11027 11028 f975a2 RegQueryValueExW 11026->11028 11027->10913 11029 f975c1 RegCloseKey 11028->11029 11030 f975d6 GetLastError RegCloseKey 11028->11030 11029->10913 11030->10913 11032 f97d7c CreateToolhelp32Snapshot 11031->11032 11033 f97da2 11031->11033 11034 f97dad Process32FirstW 11032->11034 11035 f97d94 VirtualFree 11032->11035 11033->10933 11036 f97e9d VirtualFree CloseHandle 11034->11036 11043 f97dcd 11034->11043 11035->11033 11037 f97ebd VirtualFree 11036->11037 11038 f97ec7 11036->11038 11037->11038 11038->10933 11039 f97e77 11041 f97e95 11039->11041 11042 f97e85 lstrlenW 11039->11042 11040 f97de0 lstrcmpiW 11040->11043 11041->11036 11042->11041 11043->11039 11043->11040 11044 f97e0a lstrcpyW lstrcatW 11043->11044 11045 f97e1f lstrcatW lstrcatW 11043->11045 11046 f97e57 Process32NextW 11043->11046 11047 f97e30 lstrlenW 11044->11047 11045->11047 11046->11039 11048 f97e68 GetLastError 11046->11048 11047->11046 11048->11039 11048->11043 11059 f982c0 InternetOpenW 11049->11059 11053 f971b6 11054 f971ba lstrlenA 11053->11054 11055 f971e1 VirtualFree 11053->11055 11054->11055 11056 f971ca wsprintfW 11054->11056 11057 f971fd 11055->11057 11058 f971f6 InternetCloseHandle 11055->11058 11056->11055 11057->10943 11057->10955 11058->11057 11060 f984ad InternetOpenW 11059->11060 11061 f97172 VirtualAlloc lstrlenW 11059->11061 11060->11061 11062 f984d0 11061->11062 11063 f984e9 11062->11063 11064 f984e2 InternetCloseHandle 11062->11064 11065 f982c0 2 API calls 11063->11065 11064->11063 11066 f984f0 InternetConnectW 11065->11066 11067 f98518 11066->11067 11068 f98521 VirtualAlloc wsprintfW HttpOpenRequestW 11066->11068 11067->11053 11069 f98571 HttpAddRequestHeadersW 11068->11069 11070 f98637 InternetCloseHandle InternetCloseHandle VirtualFree 11068->11070 11069->11070 11071 f985cf HttpSendRequestW 11069->11071 11070->11053 11072 f98631 GetLastError 11071->11072 11073 f985e6 InternetReadFile 11071->11073 11072->11070 11073->11070 11074 f98605 11073->11074 11074->11070 11075 f9860c InternetReadFile 11074->11075 11075->11074 11076 f9862f 11075->11076 11076->11070 11077->10781 11079 f96548 CryptGenKey 11078->11079 11080 f96512 GetLastError 11078->11080 11082 f96565 CryptExportKey CryptExportKey CryptDestroyKey CryptReleaseContext CryptAcquireContextW 11079->11082 11083 f96564 11079->11083 11081 f9651f CryptAcquireContextW 11080->11081 11085 f96538 11080->11085 11084 f9653f 11081->11084 11081->11085 11082->11085 11083->11082 11084->11079 11085->10719 11089 f995f0 11086->11089 11090 f93d57 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 11089->11090 11090->10802 11137 f97fb0 VirtualAlloc 11091->11137 11094 f981cb lstrcatW 11095 f958f6 11094->11095 11096 f981e0 11094->11096 11102 f93bd0 GetProcessHeap 11095->11102 11096->11095 11097 f97fb0 2 API calls 11096->11097 11098 f98228 lstrcatW VirtualFree 11097->11098 11099 f97fb0 2 API calls 11098->11099 11100 f98278 lstrcatW lstrcatW VirtualFree 11099->11100 11100->11096 11101 f982a1 lstrcatW 11100->11101 11101->11096 11102->10815 11104 f935f1 11103->11104 11105 f935f7 GetModuleFileNameW CreateFileW 11103->11105 11104->10842 11106 f9369a VirtualFree 11105->11106 11107 f93623 GetFileSize VirtualAlloc 11105->11107 11106->10842 11108 f93641 ReadFile 11107->11108 11109 f93693 CloseHandle 11107->11109 11110 f93685 VirtualFree 11108->11110 11111 f93656 11108->11111 11109->11106 11110->11109 11111->11110 11111->11111 11141 f934f0 lstrlenA VirtualAlloc 11111->11141 11115 f95d42 CryptBinaryToStringA 11114->11115 11116 f96043 GetModuleHandleA 11114->11116 11115->10852 11115->10853 11117 f96052 GetProcAddress lstrlenA 11116->11117 11118 f96086 _memset 11116->11118 11119 f96075 wsprintfA 11117->11119 11120 f960a0 lstrlenA 11118->11120 11119->11118 11121 f960b8 11120->11121 11122 f960c8 VirtualFree 11121->11122 11122->11115 11124 f982c0 2 API calls 11123->11124 11125 f95539 11124->11125 11148 f95250 VirtualAlloc 11125->11148 11128 f9557d lstrcatA lstrlenA lstrlenW lstrlenA 11130 f984d0 15 API calls 11128->11130 11131 f95622 11130->11131 11132 f95657 VirtualFree VirtualFree VirtualFree 11131->11132 11157 f95400 lstrlenA VirtualAlloc 11131->11157 11133 f9568b 11132->11133 11134 f95684 InternetCloseHandle 11132->11134 11133->10861 11133->10862 11134->11133 11136 f95643 11136->11132 11138 f98127 lstrlenW VirtualAlloc lstrcatW VirtualFree 11137->11138 11139 f980aa 11137->11139 11138->11094 11138->11095 11139->11138 11140 f98114 lstrcatW 11139->11140 11140->11138 11140->11139 11142 f93528 CryptStringToBinaryA 11141->11142 11143 f935af 11141->11143 11144 f9353f VirtualAlloc VirtualAlloc 11142->11144 11145 f935a1 VirtualFree 11142->11145 11143->11110 11146 f9356f 11144->11146 11147 f93576 wsprintfW wsprintfW 11144->11147 11145->11143 11146->11147 11147->11145 11149 f9536c lstrlenA VirtualAlloc VirtualAlloc 11148->11149 11150 f952c0 11148->11150 11149->11128 11151 f952eb Sleep 11150->11151 11152 f952f6 lstrlenW VirtualAlloc 11150->11152 11151->11152 11191 f95070 CreatePipe 11152->11191 11154 f95321 lstrcmpiA 11155 f95349 wsprintfW VirtualFree 11154->11155 11156 f95334 VirtualFree 11154->11156 11155->11149 11156->11150 11158 f95433 CryptStringToBinaryA 11157->11158 11160 f95459 11158->11160 11161 f9550c GetLastError 11158->11161 11162 f96010 7 API calls 11160->11162 11163 f954f3 VirtualFree 11161->11163 11164 f95463 11162->11164 11163->11136 11213 f933e0 11164->11213 11167 f9547d 11170 f954c8 11167->11170 11171 f9549f lstrlenA VirtualAlloc 11167->11171 11168 f95514 11223 f95380 VirtualAlloc VirtualAlloc 11168->11223 11172 f954e4 11170->11172 11176 f954dc HeapFree 11170->11176 11171->11170 11174 f954c0 lstrcpyA 11171->11174 11175 f954f0 11172->11175 11178 f954ed HeapFree 11172->11178 11174->11170 11175->11163 11176->11172 11178->11175 11192 f951a1 SetHandleInformation 11191->11192 11193 f95197 11191->11193 11192->11193 11194 f951b7 CreatePipe SetHandleInformation 11192->11194 11193->11154 11194->11193 11195 f951e0 VirtualAlloc 11194->11195 11196 f951fa wsprintfW 11195->11196 11197 f9522f lstrcpyA 11195->11197 11202 f94e20 11196->11202 11197->11154 11199 f9520f 11207 f94fc0 11199->11207 11203 f995f0 _memset 11202->11203 11204 f94e3e CreateProcessW 11203->11204 11205 f94e89 GetLastError 11204->11205 11206 f94e94 CloseHandle CloseHandle 11204->11206 11205->11199 11206->11199 11212 f94fcd 11207->11212 11208 f94fd6 ReadFile 11209 f95045 11208->11209 11208->11212 11210 f95063 VirtualFree 11209->11210 11211 f94eb0 lstrcpyA lstrlenA lstrcpyA 11209->11211 11210->11154 11211->11210 11212->11208 11212->11209 11227 f932b0 lstrlenA 11213->11227 11216 f934d9 ExitProcess 11218 f93412 11218->11167 11218->11168 11220 f93407 11220->11218 11221 f93483 lstrlenA GetProcessHeap HeapAlloc 11220->11221 11231 f93190 11220->11231 11235 f93200 11220->11235 11221->11220 11222 f934a5 lstrcpyA 11221->11222 11222->11220 11224 f953e9 ExitProcess 11223->11224 11225 f953b0 GetModuleFileNameW 11223->11225 11225->11224 11226 f953c2 wsprintfW ShellExecuteW 11225->11226 11226->11224 11228 f932f8 11227->11228 11229 f932cf 11227->11229 11228->11216 11228->11220 11230 f932d0 lstrlenA 11229->11230 11230->11228 11230->11230 11232 f931b0 lstrcmpiA lstrcmpiA 11231->11232 11234 f9319e 11231->11234 11232->11220 11233 f931f1 11233->11220 11234->11232 11234->11233 11237 f93210 11235->11237 11236 f9323d 11236->11220 11237->11236 11238 f9326d 11237->11238 11239 f93250 lstrlenA GetProcessHeap HeapAlloc 11237->11239 11241 f93299 11238->11241 11242 f93272 lstrlenA GetProcessHeap HeapAlloc 11238->11242 11240 f9328d 11239->11240 11240->11241 11243 f93291 lstrcpyA 11240->11243 11241->11220 11242->11240 11243->11241 11244->10872 11246 f98130 14 API calls 11245->11246 11247 f956be VirtualAlloc 11246->11247 11249 f956f1 wsprintfW 11247->11249 11278 f93bd0 GetProcessHeap 11249->11278 11252 f95746 11253 f97600 98 API calls 11252->11253 11254 f95751 11253->11254 11255 f97410 16 API calls 11254->11255 11256 f9575c lstrlenW 11255->11256 11257 f97210 49 API calls 11256->11257 11258 f95772 lstrlenW 11257->11258 11259 f95788 VirtualFree 11258->11259 11260 f95796 lstrlenW VirtualAlloc 11258->11260 11259->11260 11261 f957c5 11260->11261 11262 f957b5 wsprintfA 11260->11262 11263 f96010 7 API calls 11261->11263 11262->11261 11264 f957d5 CryptBinaryToStringA 11263->11264 11265 f957fa GetLastError 11264->11265 11266 f95800 lstrlenA VirtualAlloc lstrlenA 11264->11266 11265->11266 11267 f9582f lstrlenA 11266->11267 11269 f9584b lstrlenA 11267->11269 11273 f9586a 11267->11273 11269->11273 11270 f95520 100 API calls 11272 f9587a 11270->11272 11274 f95898 VirtualFree 11272->11274 11275 f958a2 VirtualFree 11272->11275 11273->11270 11274->11275 11276 f97ee0 10 API calls 11275->11276 11277 f958b9 VirtualFree 11276->11277 11277->10880 11278->11252 11282 f96f00 11279->11282 11281 f97142 VirtualFree ExitThread 11283 f96f1e 11282->11283 11284 f96f30 11282->11284 11304 f968a0 VirtualAlloc 11283->11304 11291 f96f34 11284->11291 11330 f96e50 VirtualAlloc wsprintfW CreateFileW 11284->11330 11287 f96f26 11287->11284 11315 f96cb0 lstrlenW lstrcatW FindFirstFileW 11287->11315 11288 f96f5f lstrlenW lstrcatW FindFirstFileW 11289 f96fa1 11288->11289 11290 f96f95 11288->11290 11292 f96fa4 lstrcmpW 11289->11292 11290->11281 11291->11281 11294 f96fbe lstrcmpW 11292->11294 11295 f97083 FindNextFileW 11292->11295 11294->11295 11296 f96fd8 lstrcatW 11294->11296 11295->11292 11297 f9709b FindClose 11295->11297 11301 f96feb 11296->11301 11297->11281 11299 f97021 lstrcatW 11300 f96f00 104 API calls 11299->11300 11300->11301 11301->11295 11301->11299 11302 f97001 lstrcatW 11301->11302 11336 f96bc0 VirtualAlloc wsprintfW 11301->11336 11303 f96f00 104 API calls 11302->11303 11303->11301 11306 f968d0 11304->11306 11305 f9690c VirtualFree 11305->11287 11307 f96973 SHGetSpecialFolderPathW 11306->11307 11314 f96904 11306->11314 11308 f9699f SHGetSpecialFolderPathW 11307->11308 11311 f96984 11307->11311 11309 f969bd SHGetSpecialFolderPathW 11308->11309 11310 f969ac 11308->11310 11312 f969db SHGetSpecialFolderPathW 11309->11312 11313 f969ca 11309->11313 11310->11309 11310->11314 11311->11308 11311->11314 11312->11314 11313->11312 11313->11314 11314->11305 11316 f96d00 lstrcmpW 11315->11316 11317 f96e22 FindNextFileW 11316->11317 11318 f96d16 lstrcmpW 11316->11318 11317->11316 11319 f96e3a FindClose 11317->11319 11318->11317 11320 f96d2c lstrcatW lstrlenW 11318->11320 11319->11284 11321 f96d4f 11320->11321 11321->11317 11322 f96d64 lstrcmpW 11321->11322 11325 f96e02 CloseHandle 11321->11325 11327 f96df1 VirtualFree 11321->11327 11328 f96dd9 lstrlenA 11321->11328 11322->11321 11323 f96d74 CreateFileW GetFileSize 11322->11323 11324 f96da1 VirtualAlloc 11323->11324 11323->11325 11324->11321 11326 f96db6 ReadFile 11324->11326 11325->11319 11325->11321 11326->11321 11326->11327 11327->11321 11344 f96c50 lstrlenA 11328->11344 11331 f96e9c GetLastError 11330->11331 11332 f96eae 11330->11332 11333 f96ee0 VirtualFree 11331->11333 11334 f96ed4 CloseHandle 11332->11334 11335 f96eb7 lstrlenW WriteFile 11332->11335 11333->11288 11334->11333 11335->11334 11346 f96ad0 11336->11346 11338 f96bfa 11343 f96c17 VirtualFree 11338->11343 11354 f96a10 lstrlenW lstrlenW 11338->11354 11341 f96c13 11341->11343 11366 f937b0 GetFileAttributesW SetFileAttributesW 11341->11366 11343->11301 11345 f96c6a 11344->11345 11345->11321 11347 f96aea lstrlenW 11346->11347 11348 f96ae0 11346->11348 11349 f96afe 11347->11349 11350 f96b10 11347->11350 11348->11338 11349->11350 11351 f96b18 lstrlenW VirtualAlloc wsprintfW 11349->11351 11350->11338 11353 f96b55 VirtualFree 11351->11353 11353->11338 11355 f96a3e lstrcmpiW 11354->11355 11356 f96a2c 11354->11356 11357 f96a5c lstrcmpiW 11355->11357 11358 f96a53 11355->11358 11356->11355 11357->11358 11359 f96a68 lstrcmpiW 11357->11359 11358->11341 11359->11358 11360 f96a74 lstrcmpiW 11359->11360 11360->11358 11361 f96a80 lstrcmpiW 11360->11361 11361->11358 11362 f96a8c lstrcmpiW 11361->11362 11362->11358 11363 f96a98 lstrcmpiW 11362->11363 11363->11358 11364 f96aa4 lstrcmpiW 11363->11364 11364->11358 11365 f96ab0 lstrcmpiW 11364->11365 11365->11341 11367 f96610 11366->11367 11368 f937f6 VirtualAlloc lstrcpyW lstrcatW 11367->11368 11369 f98880 9 API calls 11368->11369 11370 f93875 11369->11370 11371 f98880 9 API calls 11370->11371 11372 f93885 VirtualAlloc VirtualAlloc 11371->11372 11373 f96770 12 API calls 11372->11373 11374 f938f4 11373->11374 11375 f93901 MessageBoxA 11374->11375 11376 f93917 11374->11376 11377 f93985 VirtualFree VirtualFree 11375->11377 11378 f96770 12 API calls 11376->11378 11380 f93bae VirtualFree 11377->11380 11379 f9392c 11378->11379 11381 f9394c 11379->11381 11382 f93933 GetLastError 11379->11382 11380->11343 11383 f9395f CreateFileW 11381->11383 11382->11380 11383->11377 11384 f939ae VirtualAlloc VirtualAlloc 11383->11384 11385 f939f3 ReadFile 11384->11385 11386 f93b19 VirtualFree 11385->11386 11396 f939f0 _memmove 11385->11396 11387 f93b68 CloseHandle VirtualFree VirtualFree VirtualFree 11386->11387 11388 f93b2e WriteFile WriteFile WriteFile 11386->11388 11390 f93bab 11387->11390 11391 f93b9f MoveFileW 11387->11391 11388->11387 11389 f93a58 VirtualAlloc 11389->11396 11390->11380 11391->11390 11392 f93a77 VirtualAlloc 11393 f93ab2 VirtualFree SetFilePointerEx 11392->11393 11392->11396 11394 f93ade GetLastError 11393->11394 11395 f93ae4 WriteFile 11393->11395 11394->11395 11395->11396 11397 f93b05 VirtualFree 11395->11397 11396->11385 11396->11386 11396->11389 11396->11392 11396->11393 11396->11397 11397->11386 11397->11396 11419 f92f50 EnumDeviceDrivers 11398->11419 11400 f92d8c 11401 f92de9 GetModuleHandleW LoadCursorW LoadIconW RegisterClassExW 11400->11401 11402 f92f50 7 API calls 11400->11402 11403 f92e7b GetModuleHandleW GetModuleHandleW CreateWindowExW SetWindowLongW 11401->11403 11404 f92e75 ExitThread 11401->11404 11409 f92d99 11402->11409 11405 f92ebe ExitThread 11403->11405 11406 f92ec5 ShowWindow UpdateWindow CreateThread 11403->11406 11407 f92eed CloseHandle 11406->11407 11408 f92ef4 GetMessageW 11406->11408 11508 f92d10 SendMessageW ExitThread 11406->11508 11407->11408 11410 f92f0b 11408->11410 11411 f92f3d ExitThread 11408->11411 11409->11401 11412 f92f50 7 API calls 11409->11412 11413 f92f17 TranslateMessage DispatchMessageW 11410->11413 11414 f92dce 11412->11414 11413->11411 11415 f92f2c GetMessageW 11413->11415 11414->11411 11429 f930a0 11414->11429 11415->11411 11415->11413 11420 f92f7d 11419->11420 11421 f92f82 VirtualAlloc 11419->11421 11420->11400 11422 f92f99 11421->11422 11423 f92f9f EnumDeviceDrivers 11421->11423 11422->11400 11424 f92ff2 VirtualFree 11423->11424 11425 f92fae 11423->11425 11424->11400 11425->11424 11426 f92fc0 GetDeviceDriverBaseNameW 11425->11426 11426->11425 11427 f92fd9 lstrcmpiW 11426->11427 11427->11425 11428 f93009 VirtualFree 11427->11428 11428->11400 11430 f92f50 7 API calls 11429->11430 11431 f93151 11430->11431 11432 f92ddb 11431->11432 11433 f92f50 7 API calls 11431->11433 11432->11411 11438 f92ad0 VirtualAlloc 11432->11438 11434 f93160 11433->11434 11434->11432 11435 f92f50 7 API calls 11434->11435 11436 f9316c 11435->11436 11436->11432 11437 f92f50 7 API calls 11436->11437 11437->11432 11439 f92b02 GetModuleFileNameW GetTempPathW 11438->11439 11441 f92b48 11439->11441 11442 f92b4c 11441->11442 11443 f92b53 lstrlenW 11441->11443 11481 f92960 lstrlenW 11442->11481 11453 f98730 CryptAcquireContextW 11443->11453 11445 f92b8e GetEnvironmentVariableW 11447 f92bac 11445->11447 11449 f92bd8 lstrcatW lstrcatW lstrcatW 11447->11449 11452 f92bb0 11447->11452 11448 f92c45 ExitThread 11464 f92890 CreateFileW 11449->11464 11451 f92c2f wsprintfW 11451->11442 11452->11448 11452->11451 11454 f98849 11453->11454 11455 f9875b VirtualAlloc 11453->11455 11454->11445 11457 f9878b 11455->11457 11458 f98852 CryptReleaseContext VirtualFree 11455->11458 11457->11458 11459 f98793 GetModuleHandleA 11457->11459 11458->11445 11460 f987d9 LoadLibraryA 11459->11460 11461 f987e7 GetProcAddress 11459->11461 11460->11461 11463 f987f6 11460->11463 11461->11463 11462 f98830 CryptReleaseContext VirtualFree 11462->11454 11463->11462 11463->11463 11465 f928f9 11464->11465 11466 f928b8 GetFileSize 11464->11466 11465->11452 11486 f93030 11466->11486 11469 f93030 7 API calls 11470 f928d5 CreateFileMappingW 11469->11470 11471 f92902 MapViewOfFile 11470->11471 11472 f928f2 CloseHandle 11470->11472 11473 f92948 CloseHandle CloseHandle 11471->11473 11474 f92916 11471->11474 11472->11465 11473->11452 11475 f93030 7 API calls 11474->11475 11476 f9291b 11475->11476 11477 f9292b 11476->11477 11491 f98880 CryptAcquireContextW 11476->11491 11502 f92830 CreateFileW 11477->11502 11482 f98730 9 API calls 11481->11482 11483 f929ad RegCreateKeyExW 11482->11483 11484 f92a8e lstrlenW RegSetValueExW RegCloseKey 11483->11484 11485 f92ac0 11483->11485 11484->11448 11485->11448 11487 f92f50 7 API calls 11486->11487 11488 f9307f 11487->11488 11489 f928c8 11488->11489 11490 f92f50 7 API calls 11488->11490 11489->11469 11490->11489 11492 f988ae VirtualAlloc 11491->11492 11493 f98972 11491->11493 11495 f988d8 11492->11495 11496 f9897b CryptReleaseContext VirtualFree 11492->11496 11493->11477 11495->11496 11497 f988e1 GetModuleHandleA 11495->11497 11496->11477 11498 f98935 GetProcAddress 11497->11498 11499 f98927 LoadLibraryA 11497->11499 11500 f98959 CryptReleaseContext VirtualFree 11498->11500 11501 f98944 11498->11501 11499->11498 11499->11500 11500->11493 11501->11500 11503 f9285b 11502->11503 11504 f9287f UnmapViewOfFile 11502->11504 11505 f9285f WriteFile 11503->11505 11506 f92873 11503->11506 11504->11473 11505->11506 11507 f92878 CloseHandle 11505->11507 11506->11507 11507->11504 11512 fd1c9d 11509->11512 11511 fd1b44 11513 fd1ca9 __mtinitlocknum 11512->11513 11514 fd3170 __lock 51 API calls 11513->11514 11515 fd1cb0 11514->11515 11516 fd1cde DecodePointer 11515->11516 11518 fd1d69 _doexit 11515->11518 11516->11518 11519 fd1cf5 DecodePointer 11516->11519 11532 fd1db7 11518->11532 11525 fd1d05 11519->11525 11521 fd1dc6 __mtinitlocknum 11521->11511 11523 fd1d12 EncodePointer 11523->11525 11524 fd1dae 11526 fd1b13 __mtinitlocknum 3 API calls 11524->11526 11525->11518 11525->11523 11527 fd1d22 DecodePointer EncodePointer 11525->11527 11528 fd1db7 11526->11528 11530 fd1d34 DecodePointer DecodePointer 11527->11530 11529 fd1dc4 11528->11529 11537 fd32da LeaveCriticalSection 11528->11537 11529->11511 11530->11525 11533 fd1dbd 11532->11533 11534 fd1d97 11532->11534 11538 fd32da LeaveCriticalSection 11533->11538 11534->11521 11536 fd32da LeaveCriticalSection 11534->11536 11536->11524 11537->11529 11538->11534

                                                      Control-flow Graph

                                                      APIs
                                                      • Sleep.KERNELBASE(000003E8), ref: 00F94B3B
                                                        • Part of subcall function 00F947E0: VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9483C
                                                        • Part of subcall function 00F947E0: lstrcpyW.KERNEL32(00000000,Global\,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9485F
                                                        • Part of subcall function 00F947E0: lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F94866
                                                        • Part of subcall function 00F947E0: CreateMutexW.KERNELBASE(00000000,00000000,00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9487E
                                                        • Part of subcall function 00F947E0: GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9488A
                                                        • Part of subcall function 00F947E0: GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F94891
                                                        • Part of subcall function 00F947E0: VirtualFree.KERNEL32(00000000,00000000,00008000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F948AB
                                                      • ExitProcess.KERNEL32 ref: 00F94B4C
                                                      • CreateThread.KERNEL32(00000000,00000000,00F92D30,00000000,00000000,00000000), ref: 00F94B61
                                                      • WaitForSingleObject.KERNEL32(00000000,00001388), ref: 00F94B79
                                                      • TerminateThread.KERNEL32(00000000,00000000), ref: 00F94B8C
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F94B96
                                                      • VirtualAlloc.KERNEL32(00000000,00000200,00003000,00000004,00000000,00000000,00000000,00000000), ref: 00F94C0A
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00F94C24
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F94C3D
                                                      • ExitProcess.KERNEL32 ref: 00F94C45
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocCreateErrorExitFreeLastProcessThread$CloseFileHandleModuleMutexNameObjectSingleSleepTerminateWaitlstrcpylstrlen
                                                      • String ID: open
                                                      • API String ID: 1803241880-2758837156
                                                      • Opcode ID: 29f167e663a1fae8eb35b505b1e95e31fd9f8185a72e33c2f74831372f6b1e67
                                                      • Instruction ID: 5405e61ecd3b87bbd2ede52009cb75506e6dd3e821403896f63307e2bd37dae4
                                                      • Opcode Fuzzy Hash: 29f167e663a1fae8eb35b505b1e95e31fd9f8185a72e33c2f74831372f6b1e67
                                                      • Instruction Fuzzy Hash: 36712B70A40208ABFF14EFE0DC5AFAE7B74AB58705F104115F601BA1D0DBB86A45EFA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 268 fe75c0-fe75e9 call fe75b0 271 fe75f0-fe75f3 268->271 272 fe760b-fe760c 271->272 273 fe75f5-fe7600 271->273 272->271 273->272 274 fe7602-fe7609 273->274 274->272 275 fe760e-fe7622 GetPEB 274->275 276 fe7628 275->276 277 fe77c5-fe77ea VirtualAlloc 275->277 278 fe7630-fe7639 276->278 279 fe77ff-fe7809 277->279 280 fe77ec-fe77ee 277->280 283 fe7640-fe764a 278->283 281 fe780b-fe7810 279->281 282 fe7842-fe7855 279->282 284 fe77f0-fe77fa 280->284 285 fe7813-fe7822 281->285 286 fe78c9-fe78d5 282->286 287 fe7857-fe786e LoadLibraryA 282->287 288 fe764f-fe765b 283->288 289 fe764c 283->289 284->284 290 fe77fc 284->290 291 fe7824-fe7830 285->291 292 fe7835-fe783d 285->292 293 fe78db-fe78f0 286->293 294 fe7981-fe79a0 call f94dd0 286->294 295 fe78b6-fe78c4 287->295 296 fe7870-fe7872 287->296 288->283 297 fe765d-fe7663 288->297 289->288 290->279 291->291 299 fe7832 291->299 292->285 300 fe783f 292->300 293->294 301 fe78f6-fe7903 293->301 295->287 298 fe78c6 295->298 302 fe7896-fe78a2 296->302 303 fe7874-fe7878 296->303 304 fe771d-fe7723 297->304 305 fe7669-fe768d 297->305 298->286 299->292 300->282 307 fe7905-fe7914 301->307 308 fe7963-fe7975 301->308 318 fe78a5-fe78ac 302->318 303->302 309 fe787a-fe7894 303->309 310 fe779e-fe77a2 304->310 311 fe7725-fe7746 304->311 312 fe7690-fe7698 305->312 316 fe7916-fe791f 307->316 317 fe7921-fe7925 307->317 308->301 313 fe797b-fe797e 308->313 309->318 314 fe77a4-fe77a6 310->314 315 fe77b2-fe77bc 310->315 320 fe7748-fe774e 311->320 321 fe76a0-fe76af 312->321 313->294 314->315 324 fe77a8-fe77aa 314->324 315->278 328 fe77c2 315->328 325 fe7959-fe795e 316->325 326 fe7927-fe7930 317->326 327 fe7932-fe7936 317->327 329 fe78ae 318->329 330 fe78b1-fe78b4 318->330 331 fe7750-fe775f 320->331 321->321 322 fe76b1-fe76b6 321->322 333 fe76b8-fe76bd 322->333 334 fe76c6-fe76dc 322->334 324->315 335 fe77ac-fe77b0 324->335 325->307 338 fe7960 325->338 326->325 336 fe7938-fe7947 327->336 337 fe7949-fe794d 327->337 328->277 329->330 330->295 330->296 331->331 332 fe7761-fe7767 331->332 339 fe778a 332->339 340 fe7769-fe7788 332->340 333->334 341 fe76bf-fe76c4 333->341 342 fe76de-fe76e5 334->342 343 fe76e7-fe76ec 334->343 335->315 335->328 336->325 337->325 344 fe794f-fe7955 337->344 338->308 345 fe778d-fe7796 339->345 340->345 341->334 346 fe770b-fe7715 341->346 347 fe7705 342->347 348 fe76ee-fe76f5 343->348 349 fe76f7-fe76fc 343->349 344->325 345->320 350 fe7798-fe779b 345->350 346->312 352 fe771b 346->352 347->346 348->347 349->347 351 fe76fe-fe7702 349->351 350->310 351->347 352->350
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction ID: acc3c6b7cf5f200e19a5288f6cb2b264b7ef56a4d6dde45517f8b293f951a3bf
                                                      • Opcode Fuzzy Hash: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction Fuzzy Hash: 48D1AE75E043568FCB24DF5AC880BA9B7B1FF58324F2945A9D855AB341E330ED41EB90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 f97600-f97617 1 f97619-f97638 VirtualAlloc GetUserNameW 0->1 2 f9763e-f97642 0->2 1->2 3 f97644-f97660 VirtualAlloc GetComputerNameW 2->3 4 f97666-f97670 2->4 3->4 5 f97672-f97687 VirtualAlloc 4->5 6 f976c6-f976ca 4->6 5->6 7 f97689-f9769f call f97580 5->7 8 f976d0-f9770a VirtualAlloc RegOpenKeyExW 6->8 9 f97765-f97769 6->9 20 f976a4-f976a6 7->20 10 f9770c-f9772e RegQueryValueExW 8->10 11 f9774e-f9775f VirtualFree 8->11 12 f97869-f9786d 9->12 13 f9776f-f9779d VirtualAlloc * 2 9->13 15 f97739 GetLastError 10->15 16 f97730-f97737 10->16 11->9 17 f978cb-f978cf 12->17 18 f9786f-f9789f VirtualAlloc call f97580 12->18 19 f977a4-f977d7 wsprintfW RegOpenKeyExW 13->19 21 f9773f-f9774c RegCloseKey 15->21 16->21 25 f9793e-f97942 17->25 26 f978d1-f978f2 GetNativeSystemInfo VirtualAlloc 17->26 18->17 43 f978a1-f978c8 call f97580 wsprintfW 18->43 23 f977d9-f977f9 RegQueryValueExW 19->23 24 f97834-f97836 19->24 27 f976b9-f976be 20->27 28 f976a8-f976af 20->28 21->9 21->11 32 f977fb-f97802 23->32 33 f97804 GetLastError 23->33 38 f97839-f9783c 24->38 29 f9795f-f97963 25->29 30 f97944-f9795a call f97ce0 25->30 34 f97933 26->34 35 f978f4-f978fb 26->35 37 f976c1-f976c3 wsprintfW 27->37 28->6 36 f976b1-f976b7 28->36 44 f97aa9 29->44 45 f97969-f979f7 VirtualAlloc * 2 GetWindowsDirectoryW GetVolumeInformationW call f97580 29->45 30->29 59 f9795c 30->59 46 f9780a-f97817 RegCloseKey 32->46 33->46 41 f97938-f9793b wsprintfW 34->41 35->34 47 f9792c-f97931 35->47 48 f9791e-f97923 35->48 49 f97902-f97911 wsprintfW ExitProcess 35->49 50 f97925-f9792a 35->50 51 f97917-f9791c 35->51 36->37 37->6 39 f9783e-f97840 38->39 40 f97846-f97863 wsprintfW VirtualFree 38->40 39->19 39->40 40->12 41->25 43->17 55 f97aaf-f97ab3 44->55 65 f979f9-f97a25 lstrlenW call f97580 45->65 66 f97a2a-f97a6b wsprintfW lstrcatW GetModuleHandleW GetProcAddress 45->66 46->24 54 f97819-f97829 lstrcmpiW 46->54 47->41 48->41 50->41 51->41 54->49 62 f9782f-f97832 54->62 57 f97ab9-f97b09 VirtualAlloc 55->57 58 f97c62-f97c69 55->58 67 f97b10-f97b1b 57->67 63 f97c6b-f97c87 VirtualAlloc 58->63 64 f97cb0-f97cbb 58->64 59->29 62->38 68 f97c89-f97c92 call f97160 63->68 69 f97ca6 63->69 65->66 72 f97a89 66->72 73 f97a6d-f97a87 lstrlenW 66->73 67->67 70 f97b1d-f97b2f 67->70 68->64 82 f97c94-f97ca0 VirtualFree 68->82 69->64 76 f97b32-f97b4a GetDriveTypeW 70->76 75 f97a90-f97aa7 VirtualFree 72->75 73->75 75->55 79 f97c3d 76->79 80 f97b50-f97b53 76->80 81 f97c43-f97c4d 79->81 80->79 83 f97b59-f97ba0 lstrcatW * 3 GetDiskFreeSpaceW 80->83 81->76 84 f97c53-f97c5d lstrlenW 81->84 82->69 85 f97c33-f97c3b lstrcatW 83->85 86 f97ba6-f97c31 call f98f30 * 2 lstrlenW wsprintfW lstrlenW wsprintfW lstrcatW 83->86 84->58 85->79 86->81
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00F97627
                                                      • GetUserNameW.ADVAPI32(00000000,?), ref: 00F97638
                                                      • VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00F97656
                                                      • GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00F97660
                                                      • VirtualAlloc.KERNELBASE(00000000,00000080,00003000,00000004), ref: 00F97680
                                                      • wsprintfW.USER32 ref: 00F976C1
                                                      • VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00F976DE
                                                      • RegOpenKeyExW.ADVAPI32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00F97702
                                                      • RegQueryValueExW.ADVAPI32(00000000,LocaleName,00000000,00000000,00F94820,?), ref: 00F97726
                                                      • GetLastError.KERNEL32 ref: 00F97739
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F97742
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F9775F
                                                      • VirtualAlloc.KERNEL32(00000000,0000008A,00003000,00000004), ref: 00F9777D
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00F97793
                                                      • wsprintfW.USER32 ref: 00F977AD
                                                      • RegOpenKeyExW.ADVAPI32(80000001,Keyboard Layout\Preload,00000000,00020019,?), ref: 00F977CF
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,00F94820,?), ref: 00F977F1
                                                      • GetLastError.KERNEL32 ref: 00F97804
                                                      • RegCloseKey.ADVAPI32(?), ref: 00F9780D
                                                      • lstrcmpiW.KERNEL32(00F94820,00000419), ref: 00F97821
                                                      • wsprintfW.USER32 ref: 00F9784E
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9785D
                                                      • VirtualAlloc.KERNEL32(00000000,00000082,00003000,00000004), ref: 00F9787D
                                                      • wsprintfW.USER32 ref: 00F978C6
                                                      • GetNativeSystemInfo.KERNEL32(?), ref: 00F978D5
                                                      • VirtualAlloc.KERNEL32(00000000,00000040,00003000,00000004), ref: 00F978E6
                                                      • wsprintfW.USER32 ref: 00F9790A
                                                      • ExitProcess.KERNEL32 ref: 00F97911
                                                      • wsprintfW.USER32 ref: 00F97939
                                                      • VirtualAlloc.KERNELBASE(00000000,00000400,00003000,00000004), ref: 00F97977
                                                      • VirtualAlloc.KERNELBASE(00000000,00000E0C,00003000,00000004), ref: 00F9798A
                                                      • GetWindowsDirectoryW.KERNEL32(00000000,00000100), ref: 00F97994
                                                      • GetVolumeInformationW.KERNELBASE(00000000,00000200,00000100,00000600,00000608,00000604,00000400,00000100), ref: 00F979CE
                                                      • lstrlenW.KERNEL32(0000060C,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00F97A00
                                                      • wsprintfW.USER32 ref: 00F97A38
                                                      • lstrcatW.KERNEL32(?,0000060C), ref: 00F97A4D
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlComputeCrc32), ref: 00F97A59
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00F97A60
                                                      • lstrlenW.KERNEL32(?), ref: 00F97A70
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00F97AA1
                                                        • Part of subcall function 00F97CE0: VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,756EF3C0,?,760773E0), ref: 00F97CFD
                                                        • Part of subcall function 00F97CE0: VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00F97D71
                                                        • Part of subcall function 00F97CE0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00F97D86
                                                        • Part of subcall function 00F97CE0: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F97D9C
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004), ref: 00F97AF8
                                                      • GetDriveTypeW.KERNEL32(?), ref: 00F97B3F
                                                      • lstrcatW.KERNEL32(?,?), ref: 00F97B66
                                                      • lstrcatW.KERNEL32(?,00FA0334), ref: 00F97B78
                                                      • lstrcatW.KERNEL32(?,00FA03A8), ref: 00F97B82
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,00F94820,?,00000000), ref: 00F97B98
                                                      • lstrlenW.KERNEL32(?,?,00000000,00F94820,00000000,00000000,00000000,00F94820,00000000), ref: 00F97BE0
                                                      • wsprintfW.USER32 ref: 00F97BFA
                                                      • lstrlenW.KERNEL32(?), ref: 00F97C08
                                                      • wsprintfW.USER32 ref: 00F97C1C
                                                      • lstrcatW.KERNEL32(?,00FA03C8), ref: 00F97C2F
                                                      • lstrcatW.KERNEL32(?,00FA03CC), ref: 00F97C3B
                                                      • lstrlenW.KERNEL32(?), ref: 00F97C56
                                                      • VirtualAlloc.KERNEL32(00000000,00000081,00003000,00000004), ref: 00F97C79
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000), ref: 00F97CA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$wsprintf$Freelstrcat$lstrlen$CloseErrorLastNameOpenQueryValue$AddressComputerCreateDirectoryDiskDriveExitHandleInfoInformationModuleNativeProcProcessSnapshotSpaceSystemToolhelp32TypeUserVolumeWindowslstrcmpi
                                                      • String ID: %I64u$%I64u/$00000419$?:\$@$ARM$CDROM$Control Panel\International$Domain$FIXED$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Identifier$Itanium$Keyboard Layout\Preload$LocaleName$NO_ROOT_DIR$ProcessorNameString$RAMDISK$REMOTE$REMOVABLE$RtlComputeCrc32$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion$SYSTEM\CurrentControlSet\services\Tcpip\Parameters$UNKNOWN$Unknown$WORKGROUP$error$ntdll.dll$productName$undefined$x64$x86
                                                      • API String ID: 153366582-3109846240
                                                      • Opcode ID: b14c83247486a8ceb57d0260a7cb7f997deed4c21413447b4019fd505922ee0d
                                                      • Instruction ID: 9a697bdf2823c1759a7e2d03f151b334f09c69bbf315dd513ca112c06e21f502
                                                      • Opcode Fuzzy Hash: b14c83247486a8ceb57d0260a7cb7f997deed4c21413447b4019fd505922ee0d
                                                      • Instruction Fuzzy Hash: 211294B0A50304BFEB21AFA4DC4AFAEBBB4FF04700F100519F645A61E0DBB5A954EB55

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 91 f97210-f97228 92 f9722a-f9724a lstrcatW * 4 91->92 93 f9724c-f9724f 91->93 92->93 94 f9726d-f97271 93->94 95 f97251-f9726b lstrcatW * 4 93->95 96 f9728f-f97293 94->96 97 f97273-f9728d lstrcatW * 4 94->97 95->94 98 f972b1-f972b5 96->98 99 f97295-f972af lstrcatW * 4 96->99 97->96 100 f972d3-f972d7 98->100 101 f972b7-f972d1 lstrcatW * 4 98->101 99->98 102 f972d9-f972f3 lstrcatW * 4 100->102 103 f972f5-f972f9 100->103 101->100 102->103 104 f972fb-f97315 lstrcatW * 4 103->104 105 f97317-f9731b 103->105 104->105 106 f97339-f9733d 105->106 107 f9731d-f97337 lstrcatW * 4 105->107 108 f9735b-f9735f 106->108 109 f9733f-f97359 lstrcatW * 4 106->109 107->106 110 f973cc-f973d0 108->110 111 f97361-f9737a VirtualAlloc 108->111 109->108 112 f973ee-f97402 lstrlenW 110->112 113 f973d2-f973ec lstrcatW * 4 110->113 114 f9737c-f9738f wsprintfW 111->114 115 f97391-f9739d wsprintfW 111->115 113->112 116 f973a0-f973c6 lstrcatW * 4 VirtualFree 114->116 115->116 116->110
                                                      APIs
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F97231
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97239
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97242
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9724A
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F97255
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9725D
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97263
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9726B
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F97277
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9727F
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97285
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9728D
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F97299
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972A1
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972A7
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972AF
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F972BB
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972C3
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972C9
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972D1
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F972DD
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972E5
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972EB
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F972F3
                                                      • lstrcatW.KERNEL32(?,00F94B46,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F972FF
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97307
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9730D
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97315
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F97321
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97329
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9732F
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97337
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F97343
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9734B
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97351
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97359
                                                      • VirtualAlloc.KERNELBASE(00000000,00000042,00003000,00000040,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000), ref: 00F9736C
                                                      • wsprintfW.USER32 ref: 00F97386
                                                      • wsprintfW.USER32 ref: 00F97397
                                                      • lstrcatW.KERNEL32(?,?,?,00000000,00000000,?,00000000), ref: 00F973A4
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,00000000,00000000,?,00000000), ref: 00F973AC
                                                      • lstrcatW.KERNEL32(?,?,?,00000000,00000000,?,00000000), ref: 00F973B2
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,00000000,00000000,?,00000000), ref: 00F973BA
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00F973C6
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00F973D6
                                                      • lstrcatW.KERNEL32(?,00F9FFF8,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F973DE
                                                      • lstrcatW.KERNEL32(?,?,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F973E4
                                                      • lstrcatW.KERNEL32(?,00F9FFFC,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F973EC
                                                      • lstrlenW.KERNEL32(?,00000000,00000000,?,?,00F94879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F973EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtualwsprintf$AllocFreelstrlen
                                                      • String ID: %x%x$undefined
                                                      • API String ID: 3872469520-3801831566
                                                      • Opcode ID: 0f1d4a71d75f0997e549079b1378a9bc601894d2ac6dfa86319298faaefed450
                                                      • Instruction ID: c841f0b0080e1a91c4f2b1c307593ee0e72b6913157741632ff07ae8343ab5a7
                                                      • Opcode Fuzzy Hash: 0f1d4a71d75f0997e549079b1378a9bc601894d2ac6dfa86319298faaefed450
                                                      • Instruction Fuzzy Hash: 8A517E31146768B6EF233F628C49F9F3E18EFC6715F120060F910940968B698656FFAB

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 174 fd123b-fd125b call fd2790 call fd25d3 179 fd125d-fd125f 174->179 180 fd1261-fd1270 174->180 181 fd1294-fd129e call fd1de0 179->181 180->179 182 fd1272-fd127e 180->182 187 fd12a8-fd12af call fd1a4c 181->187 188 fd12a0-fd12a7 call fd138f 181->188 182->179 183 fd1280-fd1289 182->183 183->181 185 fd128b-fd1291 183->185 185->181 193 fd12b9-fd12c9 call fd26bc call fd1df5 187->193 194 fd12b1-fd12b8 call fd138f 187->194 188->187 201 fd12cb-fd12d2 call fd138f 193->201 202 fd12d3-fd12ef GetCommandLineA call fd26fc call fd20a9 193->202 194->193 201->202 209 fd12f9-fd1300 call fd22d8 202->209 210 fd12f1-fd12f8 call fd1b29 202->210 215 fd130a-fd1314 call fd1b63 209->215 216 fd1302-fd1309 call fd1b29 209->216 210->209 221 fd131d-fd1334 call fd11a8 215->221 222 fd1316-fd131c call fd1b29 215->222 216->215 225 fd1339-fd1343 221->225 222->221 227 fd134b-fd138e call fd1b54 call fd27d5 225->227 228 fd1345-fd1346 call fd1dcc 225->228 228->227
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__setargv__setenvp
                                                      • String ID: .$
                                                      • API String ID: 3919536372-2223841709
                                                      • Opcode ID: 24c9c4311bc750d5e0ccac79c5dd694301c6fb432178821fd52028e7db77623e
                                                      • Instruction ID: 4c4a3c52a4f298ec50975f80f6b0a156269d8a53e5fc2565a9e4a997c25d44ed
                                                      • Opcode Fuzzy Hash: 24c9c4311bc750d5e0ccac79c5dd694301c6fb432178821fd52028e7db77623e
                                                      • Instruction Fuzzy Hash: 8621A871A00305BAEB10BBB0AC46B6D32577F10312F1C412BF504D63D2EF798944F6A1

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00F93BD0: GetProcessHeap.KERNEL32(?,?,00F94817,00000000,?,00000000,00000000), ref: 00F93C6C
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00F97627
                                                        • Part of subcall function 00F97600: GetUserNameW.ADVAPI32(00000000,?), ref: 00F97638
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00F97656
                                                        • Part of subcall function 00F97600: GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00F97660
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNELBASE(00000000,00000080,00003000,00000004), ref: 00F97680
                                                        • Part of subcall function 00F97600: wsprintfW.USER32 ref: 00F976C1
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00F976DE
                                                        • Part of subcall function 00F97600: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00F97702
                                                        • Part of subcall function 00F97600: RegQueryValueExW.ADVAPI32(00000000,LocaleName,00000000,00000000,00F94820,?), ref: 00F97726
                                                        • Part of subcall function 00F97600: RegCloseKey.ADVAPI32(00000000), ref: 00F97742
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97462
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9746D
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97483
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9748E
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974A4
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974AF
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974C5
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(00F94B46,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974D0
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974E6
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974F1
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97507
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97512
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97531
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9753C
                                                      • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9483C
                                                      • lstrcpyW.KERNEL32(00000000,Global\,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9485F
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F94866
                                                      • CreateMutexW.KERNELBASE(00000000,00000000,00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9487E
                                                      • GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F9488A
                                                      • GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F94891
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F948AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Virtual$Alloc$ErrorLastName$CloseComputerCreateFreeHeapMutexOpenProcessQueryUserValuelstrcpywsprintf
                                                      • String ID: Global\
                                                      • API String ID: 3131499543-188423391
                                                      • Opcode ID: 036d8e851d38ea85d97a14e8cdd5a15778e25f68f0e188fdabdf1a3108d33daa
                                                      • Instruction ID: edb9bc3400cf877e527a132b86a35ea1d2e4958bc488b1cffa159b7b50add97c
                                                      • Opcode Fuzzy Hash: 036d8e851d38ea85d97a14e8cdd5a15778e25f68f0e188fdabdf1a3108d33daa
                                                      • Instruction Fuzzy Hash: 2F2135716A43147BF924B724DC4BF7F7A58DB50B10F100628F615A60E0AA947D05D7EA

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 254 fd11a8-fd1201 OpenProcess GetLastError 255 fd120a-fd120c 254->255 256 fd1203 254->256 258 fd120e-fd1228 255->258 257 fd1204 ExitProcess 256->257 258->258 259 fd122a-fd1232 call fd1113 258->259 259->257 262 fd1234 ExitThread 259->262
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000000,00000000,00000000), ref: 00FD11F2
                                                      • GetLastError.KERNEL32 ref: 00FD11F8
                                                      • ExitProcess.KERNEL32(00000000), ref: 00FD1204
                                                      • ExitThread.KERNEL32 ref: 00FD1234
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitProcess$ErrorLastOpenThread
                                                      • String ID: -$1
                                                      • API String ID: 153595879-1877142845
                                                      • Opcode ID: dbf335a80af57721a373f0a47146686aed70db8ee54d8d1fd812214ff50e9b6d
                                                      • Instruction ID: 39e37954ade39b9d0e22eeca014c4be64610bbb521af32e5e05f9d038b420d79
                                                      • Opcode Fuzzy Hash: dbf335a80af57721a373f0a47146686aed70db8ee54d8d1fd812214ff50e9b6d
                                                      • Instruction Fuzzy Hash: D501ADB0D01219ABDB149FB5980C7EEBFBAFF09751F10812AD115E6291D3B40981EBE4

                                                      Control-flow Graph

                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(?,?,00000000,00020019,?,?,0000060C,?,00F979F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00F97596
                                                      • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000080,?,?,00F979F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00F975B7
                                                      • RegCloseKey.KERNELBASE(?,?,00F979F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00F975C7
                                                      • GetLastError.KERNEL32(?,00F979F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00F975D6
                                                      • RegCloseKey.ADVAPI32(?,?,00F979F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00F975DF
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$ErrorLastOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 2437438455-0
                                                      • Opcode ID: c6e24eebf34854cf0f13e3d67e88278e657f312c28c027480f359fc46ed678f3
                                                      • Instruction ID: 74dd0e84ab5b7ac2b5493ad6a0f71040cf55778fc8daabeea2f19d78a056bf2a
                                                      • Opcode Fuzzy Hash: c6e24eebf34854cf0f13e3d67e88278e657f312c28c027480f359fc46ed678f3
                                                      • Instruction Fuzzy Hash: A7011E32A0411CFBDF119F94ED05D9A7B68EB04761B004162FD05D6120D7329A24FBE1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 354 fd1113-fd1134 call fdb4a0 call fd1069 359 fd1186-fd11a7 call fdb4e8 354->359 360 fd1136-fd1154 VirtualProtect 354->360 360->359 362 fd1156-fd115a call fe75c0 360->362 366 fd115c-fd116c 362->366 367 fd116f-fd1180 VirtualProtect 362->367 366->367 367->359
                                                      APIs
                                                      • VirtualProtect.KERNELBASE(00FE20C0,00012400,00000040,00000002,00FDFD30,00000018,00FD122F), ref: 00FD114C
                                                      • VirtualProtect.KERNELBASE(00FE20C0,00012400,00000002,?), ref: 00FD1180
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: a575496715ffb97dfe96e2e5cf3493775e1783eb0543a58548d37cced62cabfe
                                                      • Instruction ID: 1cf86a20bb4d178dab8c6ad9c66637ea4398d85d825132eca27c0a0458430c14
                                                      • Opcode Fuzzy Hash: a575496715ffb97dfe96e2e5cf3493775e1783eb0543a58548d37cced62cabfe
                                                      • Instruction Fuzzy Hash: 080171B1940309AADB10EFE58C46EDDB7BABF08710F58511AE601F62C1D774D640EA35

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 370 fd5982-fd5990 371 fd59ad-fd59cd call fd5958 LCMapStringW 370->371 372 fd5992-fd59ac LCMapStringEx 370->372
                                                      APIs
                                                      • LCMapStringEx.KERNELBASE(?,?,?,?,?,5EFC4D8B,00000000,00000000,00000000,?,00FD55A0,?,?,00000000,?,00000000), ref: 00FD59A9
                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,5EFC4D8B,?,00FD55A0,?,?,00000000,?,00000000,00000000), ref: 00FD59C6
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: String
                                                      • String ID:
                                                      • API String ID: 2568140703-0
                                                      • Opcode ID: d08033042f2598613868b70d6831cd1a4cd94775e720337cc696cc366ae95281
                                                      • Instruction ID: a44501e951f873170fcd98459423a4a044dd7f1aeac133862b4e04ce0708c331
                                                      • Opcode Fuzzy Hash: d08033042f2598613868b70d6831cd1a4cd94775e720337cc696cc366ae95281
                                                      • Instruction Fuzzy Hash: 4FF07F3201014EFFDF069F94EC0ACAE3B6AFB08360B048115FA2885020D772A971FBA1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 375 f94dd0-f94de7 376 f94de9 375->376 377 f94ded-f94e09 CreateThread 375->377 378 f94e15-f94e1b 376->378 377->378 379 f94e0b-f94e0f CloseHandle 377->379 379->378
                                                      APIs
                                                      • CreateThread.KERNELBASE(00000000,00000000,00F94B30,00000000,00000000,00000000), ref: 00F94DFC
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F94E0F
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateHandleThread
                                                      • String ID:
                                                      • API String ID: 3032276028-0
                                                      • Opcode ID: fec420704e13f53a0766b5346ffc605a96947ab43964c4a0e98efa2fed4ac57e
                                                      • Instruction ID: 9891ad00b8b481463b0fa182f49b78527890944fc97e078bde296bc330b80d5e
                                                      • Opcode Fuzzy Hash: fec420704e13f53a0766b5346ffc605a96947ab43964c4a0e98efa2fed4ac57e
                                                      • Instruction Fuzzy Hash: 4CF01C34A80208FBEB24DF949809F9CB770AB24705F20805AE901672C0D6B1AA50EF45
                                                      APIs
                                                        • Part of subcall function 00F98130: GetTickCount.KERNEL32 ref: 00F98139
                                                        • Part of subcall function 00F98130: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00F9818F
                                                        • Part of subcall function 00F98130: VirtualAlloc.KERNEL32(00000000,00000000), ref: 00F981A1
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00000000), ref: 00F981B1
                                                        • Part of subcall function 00F98130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F981BB
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00FA0604), ref: 00F981D1
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00000000), ref: 00F9822C
                                                        • Part of subcall function 00F98130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9823A
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00F9FFF8), ref: 00F98280
                                                      • VirtualAlloc.KERNEL32(00000000,00000008,00003000,00000040,00000001,?,00000001,00000001,?,00000001), ref: 00F95969
                                                      • CryptBinaryToStringA.CRYPT32(00000000,00000000,40000001,00000000,?,?,00000001,00000001,?,00000001), ref: 00F95A1C
                                                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,00000001,00000001,?,00000001), ref: 00F95A35
                                                      • lstrlenA.KERNEL32(00000000,?,00000001,00000001,?,00000001), ref: 00F95A3E
                                                      • lstrlenA.KERNEL32(?,?,00000001,00000001,?,00000001), ref: 00F95A46
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000040,?,00000001,00000001,?,00000001), ref: 00F95A5B
                                                      • lstrlenA.KERNEL32 ref: 00F95A77
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95A9E
                                                      • lstrlenA.KERNEL32(?), ref: 00F95ABD
                                                      • lstrlenA.KERNEL32(?), ref: 00F95AE4
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95AF5
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95B17
                                                      • lstrcatW.KERNEL32(?,action=call&), ref: 00F95B2B
                                                      • lstrlenW.KERNEL32(?), ref: 00F95B38
                                                      • lstrcatW.KERNEL32(756EE0B0,&id=,756EE0B0), ref: 00F95B9A
                                                      • lstrcatW.KERNEL32(756EE0B0,?), ref: 00F95BA1
                                                      • lstrcatW.KERNEL32(756EE0B0,&subid=), ref: 00F95BA9
                                                      • lstrcatW.KERNEL32(756EE0B0,?), ref: 00F95BB0
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F95BC3
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F95BD0
                                                      • lstrcatW.KERNEL32(756EE0B0,&pub_key=), ref: 00F95BD8
                                                      • lstrlenW.KERNEL32(756EE0B0), ref: 00F95BE5
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95BEE
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,756EE0B0,00000000), ref: 00F95BFF
                                                      • lstrcatW.KERNEL32(?,&priv_key=), ref: 00F95C0F
                                                      • lstrlenW.KERNEL32(?), ref: 00F95C16
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95C1F
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000), ref: 00F95C30
                                                      • lstrcatW.KERNEL32(00F9FCB0,00760026), ref: 00F95C8D
                                                      • lstrlenW.KERNEL32(?), ref: 00F95C98
                                                      • VirtualAlloc.KERNEL32(00000000,-00000012,00003000,00000040), ref: 00F95CAE
                                                      • lstrlenW.KERNEL32(?), ref: 00F95CB9
                                                      • lstrlenW.KERNEL32(?), ref: 00F95CDD
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F95CF5
                                                      • lstrlenW.KERNEL32(?,00003000,00000004), ref: 00F95D06
                                                      • VirtualAlloc.KERNEL32(00000000,-00000002), ref: 00F95D0E
                                                      • wsprintfA.USER32 ref: 00F95D27
                                                        • Part of subcall function 00F96010: VirtualAlloc.KERNEL32(00000000,0000000A,00003000,00000004,00000000,00000000), ref: 00F96033
                                                        • Part of subcall function 00F96010: GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00F96048
                                                        • Part of subcall function 00F96010: GetProcAddress.KERNEL32(00000000,RtlComputeCrc32), ref: 00F96059
                                                        • Part of subcall function 00F96010: lstrlenA.KERNEL32(00000000), ref: 00F96064
                                                        • Part of subcall function 00F96010: wsprintfA.USER32 ref: 00F9607C
                                                        • Part of subcall function 00F96010: _memset.LIBCMT ref: 00F9609B
                                                        • Part of subcall function 00F96010: lstrlenA.KERNEL32(00000000), ref: 00F960A4
                                                        • Part of subcall function 00F96010: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F960D3
                                                      • CryptBinaryToStringA.CRYPT32(?,756EE0B0,40000001,00000000,?), ref: 00F95D61
                                                      • GetLastError.KERNEL32(?,00000001,00000001,?,00000001), ref: 00F95D6B
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95D72
                                                      • VirtualAlloc.KERNEL32(00000000,00000002,00003000,00000040), ref: 00F95D81
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95D8C
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95DAC
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95DD4
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F95DE3
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000), ref: 00F95DF4
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00F95E2C
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00F95E3A
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00F95E47
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00F95E6C
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00F95E7A
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00F95E87
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F95E9E
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F95EB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Virtual$Free$lstrcat$Alloc$BinaryByteCharCryptMultiStringWide$wsprintf$AddressCountErrorHandleLastModuleProcTick_memset
                                                      • String ID: &$&advert=+380668846667$&id=$&priv_key=$&pub_key=$&subid=$.$.$=$action=call&$e$o$popkadurak$s
                                                      • API String ID: 3331976855-889238998
                                                      • Opcode ID: f9a5c5c14162d99635616f028e4afeb3339ae50bbd381a2161b2baedbaf6792a
                                                      • Instruction ID: 40393a48e2f775f93dad4500e8e7e4b2101f381f8e05af51205157d73dc2c291
                                                      • Opcode Fuzzy Hash: f9a5c5c14162d99635616f028e4afeb3339ae50bbd381a2161b2baedbaf6792a
                                                      • Instruction Fuzzy Hash: 72028C71508315AFEB21DF24CC85B1BBBE9FF88B14F00091DF585A72A0D7B4E9099B96
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F9540F
                                                      • VirtualAlloc.KERNEL32(00000000,00000002,00003000,00000040,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F95426
                                                      • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00F9544B
                                                      • lstrlenA.KERNEL32(?,00003000,00000004,00000000,?,?,?,?,00F95643,00000000,?), ref: 00F954A7
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,?,?,?,?,00F95643,00000000,?), ref: 00F954B1
                                                      • lstrcpyA.KERNEL32(00000000,?,?,?,?,?,00F95643,00000000,?), ref: 00F954C2
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00F95643,00000000,?), ref: 00F954DD
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00F95643,00000000,?), ref: 00F954EE
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F954FD
                                                      • GetLastError.KERNEL32(?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F9550C
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00F95542
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00F95562
                                                      • VirtualAlloc.KERNEL32(00000000,00032001,00003000,00000040), ref: 00F95574
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 00F9558E
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F955E3
                                                      • lstrlenW.KERNEL32(?), ref: 00F955EF
                                                      • lstrlenA.KERNEL32(00000000,00000000,00031FFF,?,00000000), ref: 00F9560B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00000000,00000000,?,00000000), ref: 00F95665
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00F95671
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00F9567B
                                                      • InternetCloseHandle.WININET(00F9587A), ref: 00F95685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Freelstrlen$Alloc$Heap$BinaryCloseCryptErrorHandleInternetLastStringlstrcatlstrcpy
                                                      • String ID: POST
                                                      • API String ID: 1287001821-1814004025
                                                      • Opcode ID: 0b7e8334ddbc3c6dce9ac73ef315ea8e0e7768f560627755283aa595b9ed70eb
                                                      • Instruction ID: 8bb016440b1a8ca1adf75a0826229596fb3d8242e0f59b6b46b6e0977dd9920a
                                                      • Opcode Fuzzy Hash: 0b7e8334ddbc3c6dce9ac73ef315ea8e0e7768f560627755283aa595b9ed70eb
                                                      • Instruction Fuzzy Hash: 6171C271E00709ABEF119FA9CC45FAEBB78FF88B50F104116FA04A7250DB749A44DB91
                                                      APIs
                                                        • Part of subcall function 00F98130: GetTickCount.KERNEL32 ref: 00F98139
                                                        • Part of subcall function 00F98130: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00F9818F
                                                        • Part of subcall function 00F98130: VirtualAlloc.KERNEL32(00000000,00000000), ref: 00F981A1
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00000000), ref: 00F981B1
                                                        • Part of subcall function 00F98130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F981BB
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00FA0604), ref: 00F981D1
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00000000), ref: 00F9822C
                                                        • Part of subcall function 00F98130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9823A
                                                        • Part of subcall function 00F98130: lstrcatW.KERNEL32(00000000,00F9FFF8), ref: 00F98280
                                                      • VirtualAlloc.KERNEL32(00000000,00004C02,00003000,00000040,?,00000000,?), ref: 00F956E4
                                                      • wsprintfW.USER32 ref: 00F95714
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000), ref: 00F9575D
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000), ref: 00F95779
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00F95790
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004,?,00000000,00000000,?,00000000), ref: 00F9579E
                                                      • VirtualAlloc.KERNEL32(00000000,-00000002,?,00000000,00000000,?,00000000), ref: 00F957A6
                                                      • wsprintfA.USER32 ref: 00F957BC
                                                      • CryptBinaryToStringA.CRYPT32(?,756EE0B0,40000001,00000000,?,?,00000000,00000000,?,00000000), ref: 00F957F0
                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,00000000), ref: 00F957FA
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00F95807
                                                      • VirtualAlloc.KERNEL32(00000000,-00000004,00003000,00000040,?,00000000,00000000,?,00000000), ref: 00F95819
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00F95823
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00F95841
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00F95860
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00F958A0
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00F958AC
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00F958C3
                                                      Strings
                                                      • popkadurak, xrefs: 00F956C7
                                                      • action=result&e_files=%d&e_size=%I64u&e_time=%d&, xrefs: 00F9570E
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$lstrlen$Free$Alloclstrcat$wsprintf$BinaryCountCryptErrorLastStringTick
                                                      • String ID: action=result&e_files=%d&e_size=%I64u&e_time=%d&$popkadurak
                                                      • API String ID: 487841380-2102589890
                                                      • Opcode ID: 520ac3942ffa9b8cb3c8ff136bb9e44d74a0867ede2d0fedd583ce45db36fbf5
                                                      • Instruction ID: e09b702f56a5eb01f0702bc7c3c6c7ef817ecdeda805a02546fba9ee8b2ffd5d
                                                      • Opcode Fuzzy Hash: 520ac3942ffa9b8cb3c8ff136bb9e44d74a0867ede2d0fedd583ce45db36fbf5
                                                      • Instruction Fuzzy Hash: F0519270E00319BBEF219B64DC46FAE7BB8EF44B04F100069F605A6191DB74AE45EF95
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000), ref: 00F96CC2
                                                      • lstrcatW.KERNEL32(00000000,00F9FF64,?,00000000), ref: 00F96CD4
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,00000000), ref: 00F96CE2
                                                      • lstrcmpW.KERNEL32(?,00F9FF68,?,00000000), ref: 00F96D0C
                                                      • lstrcmpW.KERNEL32(?,00F9FF6C,?,00000000), ref: 00F96D22
                                                      • lstrcatW.KERNEL32(00000000,?,?,00000000), ref: 00F96D34
                                                      • lstrlenW.KERNEL32(00000000,?,00000000), ref: 00F96D3B
                                                      • lstrcmpW.KERNEL32(-00000001,.sql,?,00000000), ref: 00F96D6A
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 00F96D81
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000), ref: 00F96D8C
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,00000000), ref: 00F96DAA
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000), ref: 00F96DBF
                                                      • lstrlenA.KERNEL32(*******************,?,00000000), ref: 00F96DDE
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00F96DF9
                                                      • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00F96E03
                                                      • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 00F96E2C
                                                      • FindClose.KERNEL32(?,?,00000000), ref: 00F96E3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Findlstrcmplstrlen$CloseVirtuallstrcat$AllocCreateFirstFreeHandleNextReadSize
                                                      • String ID: *******************$.sql
                                                      • API String ID: 3616287438-58436570
                                                      • Opcode ID: c209e73546d30aa132efab5fc6885dfc6124c1eb4a68b2ba50cc9504b5c22abe
                                                      • Instruction ID: 374942a901241398985025b4acf64aa3c8dba9e16b230d28bdc0509352664732
                                                      • Opcode Fuzzy Hash: c209e73546d30aa132efab5fc6885dfc6124c1eb4a68b2ba50cc9504b5c22abe
                                                      • Instruction Fuzzy Hash: 08419071A00219AFEF21AF64DC49FBF77ACEF05704F104066F902E2160EB759A45EBA5
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(00FA3058,?,00F938F4,00000000,00000000,00000000,?,00000800), ref: 00F9677B
                                                      • CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,?,00F938F4,00000000,00000000,00000000), ref: 00F967A1
                                                      • GetLastError.KERNEL32(?,00F938F4,00000000,00000000,00000000), ref: 00F967AB
                                                      • CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00F938F4,00000000,00000000,00000000), ref: 00F967C7
                                                      • LeaveCriticalSection.KERNEL32(00FA3058,?,00F938F4,00000000,00000000,00000000), ref: 00F967D6
                                                      • LeaveCriticalSection.KERNEL32(00FA3058,?,00F938F4,00000000,00000000,00000000), ref: 00F967EA
                                                      • CryptImportKey.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,?,00F938F4,00000000,00000000), ref: 00F96812
                                                      • CryptGetKeyParam.ADVAPI32(00000000,00000008,00F938F4,0000000A,00000000,?,00F938F4,00000000), ref: 00F96833
                                                      • CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,0000000A,00000000,00F938F4,?,00F938F4,00000000), ref: 00F9685B
                                                      • GetLastError.KERNEL32(?,00F938F4,00000000), ref: 00F96864
                                                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,00F938F4,00000000,00000000), ref: 00F96881
                                                      • LeaveCriticalSection.KERNEL32(00FA3058,?,00F938F4,00000000,00000000), ref: 00F9688C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$CriticalSection$ContextLeave$AcquireErrorLast$EncryptEnterImportParamRelease
                                                      • String ID: Microsoft Enhanced Cryptographic Provider v1.0
                                                      • API String ID: 3173605824-1948191093
                                                      • Opcode ID: d14f8b20e8d0e8f7f4828f5bee1859b302f63c9b00001d0a2f41eec63e34ca6a
                                                      • Instruction ID: d7a4315e47f972c9ae4f609b4e5fd42a58385b25d2ed58fdef51d7e1dd9edd92
                                                      • Opcode Fuzzy Hash: d14f8b20e8d0e8f7f4828f5bee1859b302f63c9b00001d0a2f41eec63e34ca6a
                                                      • Instruction Fuzzy Hash: 15312F75A40309BBEB10DFA0DD49F9E77B9AB48705F108509F601E61A0DB759A04EBA2
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,?), ref: 00F96F60
                                                      • lstrcatW.KERNEL32(00000000,00F9FF64,?,?), ref: 00F96F78
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?), ref: 00F96F82
                                                        • Part of subcall function 00F968A0: VirtualAlloc.KERNEL32(00000000,00000201,00003000,00000040,00000000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F968BC
                                                        • Part of subcall function 00F968A0: VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F96914
                                                      • lstrcmpW.KERNEL32(?,00F9FF68,?,?), ref: 00F96FB0
                                                      • lstrcmpW.KERNEL32(?,00F9FF6C,?,?), ref: 00F96FCA
                                                      • lstrcatW.KERNEL32(00000000,?,?,?), ref: 00F96FE0
                                                      • lstrcatW.KERNEL32(00000000,00F9FFA4,?,?), ref: 00F97007
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?), ref: 00F9708D
                                                      • FindClose.KERNEL32(00000000,?,?), ref: 00F9709E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Findlstrcat$FileVirtuallstrcmp$AllocCloseFirstFreeNextlstrlen
                                                      • String ID: SQL
                                                      • API String ID: 991218351-1299261525
                                                      • Opcode ID: 1eab1733ac2681e431f21beeff054f443f0eff9ee7759c8fae7e67a6a115e69a
                                                      • Instruction ID: b36d21d695c402eecbfa5adb8ffc8a28d8b492121a41588c9b783be762a82031
                                                      • Opcode Fuzzy Hash: 1eab1733ac2681e431f21beeff054f443f0eff9ee7759c8fae7e67a6a115e69a
                                                      • Instruction Fuzzy Hash: FD519131E0430CABEF10EF64EC84AAEB7B9EF45324F0441A6F908D6160E7359E54BB91
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00F9874D
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00F9877B
                                                      • GetModuleHandleA.KERNEL32(?), ref: 00F987CF
                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00F987DD
                                                      • GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00F987EC
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00F98835
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F98843
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00F98857
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F98865
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtual$FreeRelease$AcquireAddressAllocHandleLibraryLoadModuleProc
                                                      • String ID: Advapi32.dll$CryptGenRandomAdvapi32.dll
                                                      • API String ID: 3996966626-2152921537
                                                      • Opcode ID: a43c668ec5241ef24187676237942c3dd21cf2a9035d81d18aed8732a43b9917
                                                      • Instruction ID: 9e563d2679283a070ef5ef51af5a28924c55828960f7dc92255726d8ebca2fa9
                                                      • Opcode Fuzzy Hash: a43c668ec5241ef24187676237942c3dd21cf2a9035d81d18aed8732a43b9917
                                                      • Instruction Fuzzy Hash: 4931F875A0020DABEF208FE5DC45BEEBB78FF45740F104069E501A6150DB359A01EBB9
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00F988A0
                                                      • VirtualAlloc.KERNEL32(00000000,00000007,00003000,00000040), ref: 00F988C8
                                                      • GetModuleHandleA.KERNEL32(?), ref: 00F9891D
                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00F9892B
                                                      • GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00F9893A
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00F9895E
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9896C
                                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00F9292B), ref: 00F98980
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,?,?,00F9292B), ref: 00F9898E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtual$FreeRelease$AcquireAddressAllocHandleLibraryLoadModuleProc
                                                      • String ID: Advapi32.dll$CryptGenRandomAdvapi32.dll
                                                      • API String ID: 3996966626-2152921537
                                                      • Opcode ID: e54b4d7cb15833dfdb2a88f6ac1c523d53ccddd4834a598ce4b27418565492ad
                                                      • Instruction ID: ccc216c6b4c03cbb8c93773d818773344c7dcf1fc7649484b7a42e6ea5b2fa76
                                                      • Opcode Fuzzy Hash: e54b4d7cb15833dfdb2a88f6ac1c523d53ccddd4834a598ce4b27418565492ad
                                                      • Instruction Fuzzy Hash: 4931C971E0020CAFEF118FA5DC49BEE7B78EF45741F10405AE601E6150DB749A01DFA6
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(00F94BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,00F94BA6,?,00F94BAE), ref: 00F96508
                                                      • GetLastError.KERNEL32(?,00F94BAE), ref: 00F96512
                                                      • CryptAcquireContextW.ADVAPI32(00F94BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00F94BAE), ref: 00F9652E
                                                      • CryptGenKey.ADVAPI32(00F94BAE,0000A400,08000001,?,?,00F94BAE), ref: 00F9655A
                                                      • CryptExportKey.ADVAPI32(?,00000000,00000006,00000000,?,00000000), ref: 00F9657E
                                                      • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?), ref: 00F96596
                                                      • CryptDestroyKey.ADVAPI32(?), ref: 00F965A0
                                                      • CryptReleaseContext.ADVAPI32(00F94BAE,00000000), ref: 00F965AC
                                                      • CryptAcquireContextW.ADVAPI32(00F94BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000010), ref: 00F965C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$Context$Acquire$Export$DestroyErrorLastRelease
                                                      • String ID: Microsoft Enhanced Cryptographic Provider v1.0
                                                      • API String ID: 137402220-1948191093
                                                      • Opcode ID: fabc112d3ae10de3c51c312063a4e0ab069fbb956e2793cce6c4052f6873dd82
                                                      • Instruction ID: a5b6138a6e4c47dc4049b3f31d3c101b0744cc6fe1c78d74ce808953cacf6bed
                                                      • Opcode Fuzzy Hash: fabc112d3ae10de3c51c312063a4e0ab069fbb956e2793cce6c4052f6873dd82
                                                      • Instruction Fuzzy Hash: CA213375B90309BBEF20CBA0DD4AFDA7779AB48B01F104444FB01EA1D4D6B5DA04BBA1
                                                      APIs
                                                        • Part of subcall function 00F982C0: InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F984A4
                                                        • Part of subcall function 00F982C0: InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 00F984BD
                                                      • VirtualAlloc.KERNEL32(00000000,00002801,00003000,00000040,756EF3C0,?), ref: 00F9717F
                                                      • lstrlenW.KERNEL32(00F9FFB4), ref: 00F9718C
                                                        • Part of subcall function 00F984D0: InternetCloseHandle.WININET(?), ref: 00F984E3
                                                        • Part of subcall function 00F984D0: InternetConnectW.WININET(?,00000000,00000050,00000000,00000000,00000003,00000000,00000000), ref: 00F98502
                                                      • lstrlenA.KERNEL32(00000000,ipv4bot.whatismyipaddress.com,00F9FFB8,00000000,00000000,00000000,000027FF,?,00000000), ref: 00F971BB
                                                      • wsprintfW.USER32 ref: 00F971D3
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,ipv4bot.whatismyipaddress.com,00F9FFB8,00000000,00000000,00000000,000027FF,?,00000000), ref: 00F971E9
                                                      • InternetCloseHandle.WININET(?), ref: 00F971F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleOpenVirtuallstrlen$AllocConnectFreewsprintf
                                                      • String ID: GET$ipv4bot.whatismyipaddress.com
                                                      • API String ID: 4289327240-2259699238
                                                      • Opcode ID: 32e973544dac1148d9aa11f09b34fbd5f7423ca089882e781f1fc1d4c4386d57
                                                      • Instruction ID: 53196bc15c3552242358d47a5bae8b9d206ecc37dfb54e28003c2ad619942781
                                                      • Opcode Fuzzy Hash: 32e973544dac1148d9aa11f09b34fbd5f7423ca089882e781f1fc1d4c4386d57
                                                      • Instruction Fuzzy Hash: B401B53274031477EF216B669C4EF5B3E28AF82B51F000035FA09E11D0DA649559FAEB
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00F93673,?), ref: 00F93504
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,00F93673,?), ref: 00F9351C
                                                      • CryptStringToBinaryA.CRYPT32(00F93673,00000000,00000001,00000000,?,00000000,00000000), ref: 00F93535
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00F93673,?), ref: 00F9354C
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00F93673,?), ref: 00F93561
                                                      • wsprintfW.USER32 ref: 00F93587
                                                      • wsprintfW.USER32 ref: 00F93597
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00F93673,?), ref: 00F935A9
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$wsprintf$BinaryCryptFreeStringlstrlen
                                                      • String ID:
                                                      • API String ID: 2885909284-0
                                                      • Opcode ID: d5c7d8fc8df205dfac76339a9bb98a0464f78c692393fbe3119da8ae0d3163ae
                                                      • Instruction ID: 95c30289484569895ec3ef8c4373959e793218cd11c146a53011e51d00d3eec2
                                                      • Opcode Fuzzy Hash: d5c7d8fc8df205dfac76339a9bb98a0464f78c692393fbe3119da8ae0d3163ae
                                                      • Instruction Fuzzy Hash: 2821C071A402197BEB219BA88C41F9ABFACEF49750F140061F604E7290D6B1AE409BD5
                                                      APIs
                                                      • EnumDeviceDrivers.PSAPI(?,00000004,?), ref: 00F92F74
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00F92F8D
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocDeviceDriversEnumVirtual
                                                      • String ID:
                                                      • API String ID: 4140748134-0
                                                      • Opcode ID: 33ffaeccd7f6ac1a2e7136f627a4df3012f2b8d33df964d9665f483d721ac401
                                                      • Instruction ID: 72f0ddf2631e96d939592258edbdda449bbe333b0fbaacba22b54badf3e3fe57
                                                      • Opcode Fuzzy Hash: 33ffaeccd7f6ac1a2e7136f627a4df3012f2b8d33df964d9665f483d721ac401
                                                      • Instruction Fuzzy Hash: 27219532B0021DBBEF209B98AC85FEDB7BCEB44715F1041A7FA04D6180D7719A55AFA1
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F984A4
                                                      • InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 00F984BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InternetOpen
                                                      • String ID: $ $ $ $ $ $($)$.$.$0$1$3$3$3$5$5$5$5$6$6$7$7$8$8$A$G$K$K$L$M$O$T$T$a$a$a$c$d$e$e$e$e$h$i$i$i$l$o$o$p$t$w$z
                                                      • API String ID: 2038078732-2805935662
                                                      • Opcode ID: e17e4731a0118dfd9854b96f48bf71a725530964410ffe091c5894cc41d8bdf8
                                                      • Instruction ID: 880b5c934e3ad443b879966fbf0f1990f9894aee93cde35463d1097ccac1f182
                                                      • Opcode Fuzzy Hash: e17e4731a0118dfd9854b96f48bf71a725530964410ffe091c5894cc41d8bdf8
                                                      • Instruction Fuzzy Hash: DB4197B4811368DEEB25CF91999879EBFF5BB04748F50819ED5086B201C7F60A89CF64
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00F94A42
                                                      • VirtualAlloc.KERNEL32(00000000,0000022C,00003000,00000004), ref: 00F94A5C
                                                      • Process32FirstW.KERNEL32(00000000,00000000), ref: 00F94A75
                                                      • lstrcmpiW.KERNEL32(00000002,00000024), ref: 00F94A95
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F94AA5
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F94AB4
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F94AC1
                                                      • Process32NextW.KERNEL32(?,00000000), ref: 00F94ADA
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F94AF3
                                                      • CloseHandle.KERNEL32(?), ref: 00F94AFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcessProcess32Virtual$AllocCreateFirstFreeNextOpenSnapshotTerminateToolhelp32lstrcmpi
                                                      • String ID: agntsvc.exeagntsvc.exe$agntsvc.exeencsvc.exe$agntsvc.exeisqlplussvc.exe$dbeng50.exe$dbsnmp.exe$excel.exe$firefoxconfig.exe$infopath.exe$msaccess.exe$msftesql.exe$mspub.exe$mydesktopqos.exe$mydesktopservice.exe$mysqld-nt.exe$mysqld-opt.exe$mysqld.exe$ocautoupds.exe$ocomm.exe$ocssd.exe$onenote.exe$oracle.exe$outlook.exe$powerpnt.exe$sqbcoreservice.exe$sqlagent.exe$sqlbrowser.exe$sqlservr.exe$sqlwriter.exe$steam.exe$synctime.exe$tbirdconfig.exe$thebat.exe$thebat64.exe$thunderbird.exe$visio.exe$winword.exe$wordpad.exe$xfssvccon.exe
                                                      • API String ID: 3586910739-2697476765
                                                      • Opcode ID: d5364ff0cef00a8ee2a2607b322290a2fc4a400f8e6c19837f95b772d7f57458
                                                      • Instruction ID: 02a0efd25f1dc70dec556cbd6791292156abc421a5caf19de819b388ca35d18b
                                                      • Opcode Fuzzy Hash: d5364ff0cef00a8ee2a2607b322290a2fc4a400f8e6c19837f95b772d7f57458
                                                      • Instruction Fuzzy Hash: 21514DB15083849FFB20CF55D84875BBBE4BB81718F64492CE598DA262C7B0940DEF9B
                                                      APIs
                                                        • Part of subcall function 00F93D00: _memset.LIBCMT ref: 00F93D52
                                                        • Part of subcall function 00F93D00: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00F93D76
                                                        • Part of subcall function 00F93D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00F93D7A
                                                        • Part of subcall function 00F93D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00F93D7E
                                                        • Part of subcall function 00F93D00: VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00F93DA5
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000040), ref: 00F9477F
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000100), ref: 00F94795
                                                      • lstrcatW.KERNEL32(00000000,0063005C), ref: 00F9479D
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,?,00000000,00000000), ref: 00F947B3
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F947C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$Virtual$AllocDirectoryExecuteFreeInfoShellSystemVerifyVersion_memsetlstrcat
                                                      • String ID: $ $ $ $.$.$/$/$\$\$a$a$a$b$c$d$d$e$e$e$e$h$i$l$l$m$m$m$n$o$open$p$s$s$t$u$w$w$x$x
                                                      • API String ID: 2684037697-4098772853
                                                      • Opcode ID: 78fa3a6a1b1ee8054e89ade4f95d584b3cf8c4248652df0f0d05785c73fc2086
                                                      • Instruction ID: fd16b1f4c47532598d3cdcf5c746f82bd2ce77e7c167408fa4a66470d37f252c
                                                      • Opcode Fuzzy Hash: 78fa3a6a1b1ee8054e89ade4f95d584b3cf8c4248652df0f0d05785c73fc2086
                                                      • Instruction Fuzzy Hash: 164138B0148384DFE7208F119848B5BBFE2BB81B48F10491DF6985A291C7F6858CCFA7
                                                      APIs
                                                        • Part of subcall function 00F93D00: _memset.LIBCMT ref: 00F93D52
                                                        • Part of subcall function 00F93D00: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00F93D76
                                                        • Part of subcall function 00F93D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00F93D7A
                                                        • Part of subcall function 00F93D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00F93D7E
                                                        • Part of subcall function 00F93D00: VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00F93DA5
                                                        • Part of subcall function 00F93C80: AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00F93CB0
                                                      • ExpandEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F93E6D
                                                      • wsprintfW.USER32 ref: 00F93F37
                                                      • VirtualAlloc.KERNEL32(00000000,0000003D,00003000,00000040), ref: 00F93F4B
                                                      • GetForegroundWindow.USER32 ref: 00F93F60
                                                      • ShellExecuteExW.SHELL32(00000000), ref: 00F93FC1
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F93FD4
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F93FE6
                                                      • CloseHandle.KERNEL32(?), ref: 00F93FEF
                                                      • ExitProcess.KERNEL32 ref: 00F93FF7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$Virtual$AllocAllocateCloseEnvironmentExecuteExitExpandForegroundFreeHandleInfoInitializeObjectProcessShellSingleStringsVerifyVersionWaitWindow_memsetwsprintf
                                                      • String ID: $ $"$"$%$%$2$\$\$a$a$c$c$c$d$e$e$e$i$l$m$m$n$o$p$r$r$r$s$s$s$t$t$w$y
                                                      • API String ID: 561366689-3790645798
                                                      • Opcode ID: d8e4138a363b7ae2b5cf33392bcfb5e74e1dbb2bf568049c8b4f76767b03a3e9
                                                      • Instruction ID: f457036ca0ef93eb0b74161a11db20868120dd388875b5a929413fd51a999a9a
                                                      • Opcode Fuzzy Hash: d8e4138a363b7ae2b5cf33392bcfb5e74e1dbb2bf568049c8b4f76767b03a3e9
                                                      • Instruction Fuzzy Hash: 325136B0508344EFE3208F51D848B9ABBF9BF84748F004A1DE69886251D7BA9558DFD6
                                                      APIs
                                                      • CreatePipe.KERNEL32(00FA3080,00FA307C,?,00000000,00000001,00000001,00000000), ref: 00F9518D
                                                      • SetHandleInformation.KERNEL32(00000001,00000000), ref: 00F951B1
                                                      • CreatePipe.KERNEL32(00FA3078,00FA3084,0000000C,00000000), ref: 00F951CA
                                                      • SetHandleInformation.KERNEL32(00000001,00000000), ref: 00F951DA
                                                      • VirtualAlloc.KERNEL32(00000000,00002800,00003000,00000004), ref: 00F951EE
                                                      • wsprintfW.USER32 ref: 00F951FF
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F95220
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateHandleInformationPipeVirtual$AllocFreewsprintf
                                                      • String ID: $ $.$.$1$2$S$S$c$c$d$d$fabian wosar <3$l$l$m$m$n$n$n$n$n$n$o$o$o$o$u$u$u$u
                                                      • API String ID: 1490407255-1922363339
                                                      • Opcode ID: 7514a1a7416360a1be02b0d47b62ffd7a47de5de294daff00d1e00877da820d5
                                                      • Instruction ID: a43352fce32026445a4fed1159cf488e7017bbb7f9615a94e6d47c65d38d5919
                                                      • Opcode Fuzzy Hash: 7514a1a7416360a1be02b0d47b62ffd7a47de5de294daff00d1e00877da820d5
                                                      • Instruction Fuzzy Hash: 704150B0E4031CABEB209F90EC497EDBFB6FB04B19F104119E504AA291C7F65989DF95
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(00000000,00000010,00000000,00000000), ref: 00F937C4
                                                      • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 00F937CF
                                                      • VirtualAlloc.KERNEL32(00000000,00000401,00003000,00000040,00000000,00000000,00000000,?), ref: 00F9380A
                                                      • lstrcpyW.KERNEL32(00000000,00000000), ref: 00F93828
                                                      • lstrcatW.KERNEL32(00000000,0043002E), ref: 00F93833
                                                        • Part of subcall function 00F98880: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00F988A0
                                                        • Part of subcall function 00F98880: VirtualAlloc.KERNEL32(00000000,00000007,00003000,00000040), ref: 00F988C8
                                                        • Part of subcall function 00F98880: GetModuleHandleA.KERNEL32(?), ref: 00F9891D
                                                        • Part of subcall function 00F98880: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00F9892B
                                                        • Part of subcall function 00F98880: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00F9893A
                                                        • Part of subcall function 00F98880: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00F9895E
                                                        • Part of subcall function 00F98880: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9896C
                                                        • Part of subcall function 00F98880: CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00F9292B), ref: 00F98980
                                                        • Part of subcall function 00F98880: VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,?,?,00F9292B), ref: 00F9898E
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000004), ref: 00F93896
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000004), ref: 00F938C1
                                                        • Part of subcall function 00F96770: EnterCriticalSection.KERNEL32(00FA3058,?,00F938F4,00000000,00000000,00000000,?,00000800), ref: 00F9677B
                                                        • Part of subcall function 00F96770: CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,?,00F938F4,00000000,00000000,00000000), ref: 00F967A1
                                                        • Part of subcall function 00F96770: GetLastError.KERNEL32(?,00F938F4,00000000,00000000,00000000), ref: 00F967AB
                                                        • Part of subcall function 00F96770: CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00F938F4,00000000,00000000,00000000), ref: 00F967C7
                                                        • Part of subcall function 00F96770: LeaveCriticalSection.KERNEL32(00FA3058,?,00F938F4,00000000,00000000,00000000), ref: 00F967D6
                                                      • MessageBoxA.USER32(00000000,Fatal error: rsaenh.dll is not initialized as well,Fatal error,00000010), ref: 00F9390F
                                                      • GetLastError.KERNEL32 ref: 00F93933
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9398D
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F93999
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F93BB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$ContextCryptFree$Alloc$Acquire$AttributesCriticalErrorFileLastReleaseSection$AddressEnterHandleLeaveLibraryLoadMessageModuleProclstrcatlstrcpy
                                                      • String ID: $.$B$Fatal error$Fatal error: rsaenh.dll is not initialized as well$R
                                                      • API String ID: 3050744578-4284454829
                                                      • Opcode ID: 7172a6f46de754887fdd36c01a77cb8df565cbe05c7d78aacb507c5f22fa411c
                                                      • Instruction ID: 7a2009fbe76c57f2d4b5de094ad7d52aff7f03f86f63e61102912b4e1eb5ecf9
                                                      • Opcode Fuzzy Hash: 7172a6f46de754887fdd36c01a77cb8df565cbe05c7d78aacb507c5f22fa411c
                                                      • Instruction Fuzzy Hash: C0C13A71E40308ABEF219B94DC46FEEBBB8BF48714F104115FA40BA1D0DBB56A449FA5
                                                      APIs
                                                        • Part of subcall function 00F93BD0: GetProcessHeap.KERNEL32(?,?,00F94817,00000000,?,00000000,00000000), ref: 00F93C6C
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00F97627
                                                        • Part of subcall function 00F97600: GetUserNameW.ADVAPI32(00000000,?), ref: 00F97638
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00F97656
                                                        • Part of subcall function 00F97600: GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00F97660
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNELBASE(00000000,00000080,00003000,00000004), ref: 00F97680
                                                        • Part of subcall function 00F97600: wsprintfW.USER32 ref: 00F976C1
                                                        • Part of subcall function 00F97600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 00F976DE
                                                        • Part of subcall function 00F97600: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00F97702
                                                        • Part of subcall function 00F97600: RegQueryValueExW.ADVAPI32(00000000,LocaleName,00000000,00000000,00F94820,?), ref: 00F97726
                                                        • Part of subcall function 00F97600: RegCloseKey.ADVAPI32(00000000), ref: 00F97742
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97462
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9746D
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97483
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9748E
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974A4
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974AF
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974C5
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(00F94B46,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974D0
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974E6
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974F1
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97507
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97512
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97531
                                                        • Part of subcall function 00F97410: lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9753C
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F94331
                                                      • lstrlenW.KERNEL32(ransom_id=,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F94373
                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F943F2
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F943F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$AllocVirtual$Name$CloseComputerHeapOpenProcessQueryUserValuelstrcpywsprintf
                                                      • String ID: -$.$.$/$/$a$a$c$d$d$h$h$j$l$m$n$n$o$o$r$r$r$ransom_id=$s$t$t$w$w$w$y${USERID}
                                                      • API String ID: 4100118565-2385900546
                                                      • Opcode ID: 59e05851b52bfe5a5f3de2626af6271cd4870b147469e798893c5078fb5499d2
                                                      • Instruction ID: e1c450bb2461f09aab63624dc0b0c2c450a4e0dafe3a732eb089c4225d327351
                                                      • Opcode Fuzzy Hash: 59e05851b52bfe5a5f3de2626af6271cd4870b147469e798893c5078fb5499d2
                                                      • Instruction Fuzzy Hash: 2F7115B05083409BFB20DF14C809B7B7BE1FB91758F10891CFA855B291DBF99949EB92
                                                      APIs
                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F943F2
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F943F9
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004), ref: 00F94565
                                                      • wsprintfW.USER32 ref: 00F9457F
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F94596
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocFreelstrcpylstrlenwsprintf
                                                      • String ID: -$.$.$/$/$a$a$c$d$d$h$h$j$l$m$n$n$o$o$r$r$r$s$t$t$w$w$w$y${USERID}
                                                      • API String ID: 4033391921-3341315666
                                                      • Opcode ID: ca85908122a7b79c3e1b8e1f75dfdb59ed4e402ae6d758cf682744a4de40f925
                                                      • Instruction ID: b2a5b1aaf3fad32b0723f5310de70f276cda0d77bcc9444a736c26859ea2c625
                                                      • Opcode Fuzzy Hash: ca85908122a7b79c3e1b8e1f75dfdb59ed4e402ae6d758cf682744a4de40f925
                                                      • Instruction Fuzzy Hash: 28417EB0508340CBEB20DF14D85872ABFE2FB9175CF14891CE6854B261D7FA9989DF92
                                                      APIs
                                                      • lstrlenW.KERNEL32(00520050,00000041,7572F770,00000000), ref: 00F9299D
                                                        • Part of subcall function 00F98730: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00F9874D
                                                        • Part of subcall function 00F98730: VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00F9877B
                                                        • Part of subcall function 00F98730: GetModuleHandleA.KERNEL32(?), ref: 00F987CF
                                                        • Part of subcall function 00F98730: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00F987DD
                                                        • Part of subcall function 00F98730: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00F987EC
                                                        • Part of subcall function 00F98730: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00F98835
                                                        • Part of subcall function 00F98730: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F98843
                                                      • RegCreateKeyExW.ADVAPI32(80000001,004F0053,00000000,00000000,00000000,000F003F,00000000,00F92C45,00000000), ref: 00F92A84
                                                      • lstrlenW.KERNEL32(00000000), ref: 00F92A8F
                                                      • RegSetValueExW.ADVAPI32(00F92C45,00520050,00000000,00000001,00000000,00000000), ref: 00F92AA4
                                                      • RegCloseKey.ADVAPI32(00F92C45), ref: 00F92AB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtuallstrlen$AcquireAddressAllocCloseCreateFreeHandleLibraryLoadModuleProcReleaseValue
                                                      • String ID: A$F$H$I$P$R$R$S$U$V$W$\$\$\$d$e$f$i$i$i$n$n$n$n$r$r$r$s$u$w
                                                      • API String ID: 553367697-3791882466
                                                      • Opcode ID: 5fa35847b1af723553878cd3c03130be03888d01e21f75ca510da100f97cd5d3
                                                      • Instruction ID: 3c0b519f0306d375a33a71aa02048666020fd5205c9ee12ed1ab882deb78326a
                                                      • Opcode Fuzzy Hash: 5fa35847b1af723553878cd3c03130be03888d01e21f75ca510da100f97cd5d3
                                                      • Instruction Fuzzy Hash: 3E31ECB0D0121CDFEB20CF91E949BEDBFB9FB01709F108119D5186A291D7BA4948DF95
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,756EF3C0,?,760773E0), ref: 00F97CFD
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00F97D71
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00F97D86
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F97D9C
                                                      • Process32FirstW.KERNEL32(00000000,00000000), ref: 00F97DBF
                                                      • lstrcmpiW.KERNEL32(00FA03D4,-00000024), ref: 00F97DE5
                                                      • Process32NextW.KERNEL32(?,?), ref: 00F97E5E
                                                      • GetLastError.KERNEL32 ref: 00F97E68
                                                      • lstrlenW.KERNEL32(00000000), ref: 00F97E86
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F97EAB
                                                      • CloseHandle.KERNEL32(?), ref: 00F97EB0
                                                      • VirtualFree.KERNEL32(?,?,00008000), ref: 00F97EC5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Free$AllocProcess32$CloseCreateErrorFirstHandleLastNextSnapshotToolhelp32lstrcmpilstrlen
                                                      • String ID: AVP.EXE$Mcshield.exe$NortonAntiBot.exe$ashDisp.exe$avengine.exe$avgnt.exe$cfp.exe$cmdagent.exe$ekrn.exe$fsguiexe.exe$msmpeng.exe$pccpfw.exe$persfw.exe$smc.exe
                                                      • API String ID: 2470459410-3383346926
                                                      • Opcode ID: 0ff5129fbc45ab716640238627544958f7d722c4a081eedda7e19c5f745937e7
                                                      • Instruction ID: 510d87c56c8abf531f1522183399ea1da1f2abb0702dca0ab485488a01b96c4c
                                                      • Opcode Fuzzy Hash: 0ff5129fbc45ab716640238627544958f7d722c4a081eedda7e19c5f745937e7
                                                      • Instruction Fuzzy Hash: 1F516FB1D14318ABDF20EF55EC48B9D7BB4FF89710F20405AE604AB290CBB15945EF95
                                                      APIs
                                                        • Part of subcall function 00F92F50: EnumDeviceDrivers.PSAPI(?,00000004,?), ref: 00F92F74
                                                      • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 00F92E19
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00F92E2E
                                                      • LoadIconW.USER32 ref: 00F92E59
                                                      • RegisterClassExW.USER32(?), ref: 00F92E68
                                                      • ExitThread.KERNEL32 ref: 00F92E75
                                                        • Part of subcall function 00F92F50: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00F92F8D
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,00007F00), ref: 00F92E7B
                                                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00007F00), ref: 00F92E81
                                                      • CreateWindowExW.USER32(00000000,win32app,firefox,00CF0000,80000000,80000000,00000005,00000005,00000000,00000000,00000000), ref: 00F92EA7
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00F92EB4
                                                      • ExitThread.KERNEL32 ref: 00F92EBF
                                                        • Part of subcall function 00F92F50: EnumDeviceDrivers.PSAPI(00000000,00000000,?), ref: 00F92FA8
                                                        • Part of subcall function 00F92F50: GetDeviceDriverBaseNameW.PSAPI(00000000,?,00000400), ref: 00F92FCF
                                                        • Part of subcall function 00F92F50: lstrcmpiW.KERNEL32(?,006C006B), ref: 00F92FE3
                                                        • Part of subcall function 00F92F50: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F92FFA
                                                      • ExitThread.KERNEL32 ref: 00F92F3F
                                                        • Part of subcall function 00F92AD0: VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000040), ref: 00F92AEA
                                                        • Part of subcall function 00F92AD0: GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00F92B2C
                                                        • Part of subcall function 00F92AD0: GetTempPathW.KERNEL32(00000100,00000000), ref: 00F92B38
                                                        • Part of subcall function 00F92AD0: ExitThread.KERNEL32 ref: 00F92C47
                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,00007F00), ref: 00F92EC8
                                                      • UpdateWindow.USER32(00000000), ref: 00F92ECF
                                                      • CreateThread.KERNEL32(00000000,00000000,00F92D10,00000000,00000000,00000000), ref: 00F92EE3
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00007F00), ref: 00F92EEE
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F92F05
                                                      • TranslateMessage.USER32(?), ref: 00F92F1C
                                                      • DispatchMessageW.USER32(?), ref: 00F92F23
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F92F37
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$ExitHandleMessageModuleWindow$DeviceVirtual$AllocCreateDriversEnumLoadName$BaseClassCloseCursorDispatchDriverFileFreeIconLongPathRegisterShowTempTranslateUpdatelstrcmpi
                                                      • String ID: 0$1$d$f$firefox$k$s$s$s$s$w$win32app
                                                      • API String ID: 3011903443-520298170
                                                      • Opcode ID: f3afe5a892fd934d13366122705224fd9723ef4aeb18633f531ed3bf1dc824d2
                                                      • Instruction ID: 77cbbb9424fe27f3c98c875ec8f1e5a789b9cc145ac1fa8db92b2f485b1032f3
                                                      • Opcode Fuzzy Hash: f3afe5a892fd934d13366122705224fd9723ef4aeb18633f531ed3bf1dc824d2
                                                      • Instruction Fuzzy Hash: 8F519E70648305AFF760AF608C49B5B7BE4AF44B58F10081EF684AA1D0E7B4D589DF96
                                                      APIs
                                                      • InternetCloseHandle.WININET(?), ref: 00F984E3
                                                      • InternetConnectW.WININET(?,00000000,00000050,00000000,00000000,00000003,00000000,00000000), ref: 00F98502
                                                      • VirtualAlloc.KERNEL32(00000000,00002800,00003000,00000040,?,?,?,?,?,?,?,00F971B6,ipv4bot.whatismyipaddress.com,00F9FFB8,00000000,00000000), ref: 00F9852F
                                                      • wsprintfW.USER32 ref: 00F98543
                                                      • HttpOpenRequestW.WININET(00000000,?,00000000,HTTP/1.1,00000000,00000000,8404F700,00000000), ref: 00F98561
                                                      • HttpAddRequestHeadersW.WININET(00000000,006F0048,000000FF,00000000), ref: 00F985C5
                                                      • HttpSendRequestW.WININET(00000000,00610072,0020003A,00000000,00740069), ref: 00F985DC
                                                      • InternetReadFile.WININET(00000000,0062002E,00650071,00000000), ref: 00F985FB
                                                      • InternetReadFile.WININET(00000000,0062002E,00650071,00000000), ref: 00F98625
                                                      • GetLastError.KERNEL32 ref: 00F98631
                                                      • InternetCloseHandle.WININET(00000000), ref: 00F9863E
                                                      • InternetCloseHandle.WININET(00000000), ref: 00F98643
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,00F971B6,ipv4bot.whatismyipaddress.com,00F9FFB8), ref: 00F9864F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleHttpRequest$FileReadVirtual$AllocConnectErrorFreeHeadersLastOpenSendwsprintf
                                                      • String ID: .$:$H$HTTP/1.1$i$n$o$r$r$s$w
                                                      • API String ID: 3906118045-693250572
                                                      • Opcode ID: f5403b7ce1dd5cc412ea7560c873e56c6b6dc077596aa39b62e137adc06dd416
                                                      • Instruction ID: 960dbc03479c542d9060d1a6c7f182612503c0ff08d4ab21adcc43c834d16aa3
                                                      • Opcode Fuzzy Hash: f5403b7ce1dd5cc412ea7560c873e56c6b6dc077596aa39b62e137adc06dd416
                                                      • Instruction Fuzzy Hash: AF419331A40208BBEF118F55DC48FAE7FB8EF05794F14401AF904AA2A0DBB59951EFA5
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000010,00000000,00000000,00F96C13), ref: 00F96A1C
                                                      • lstrlenW.KERNEL32(00000000), ref: 00F96A21
                                                      • lstrcmpiW.KERNEL32(-00000004,desktop.ini), ref: 00F96A4D
                                                      • lstrcmpiW.KERNEL32(-00000004,autorun.inf), ref: 00F96A62
                                                      • lstrcmpiW.KERNEL32(-00000004,ntuser.dat), ref: 00F96A6E
                                                      • lstrcmpiW.KERNEL32(-00000004,iconcache.db), ref: 00F96A7A
                                                      • lstrcmpiW.KERNEL32(-00000004,bootsect.bak), ref: 00F96A86
                                                      • lstrcmpiW.KERNEL32(-00000004,boot.ini), ref: 00F96A92
                                                      • lstrcmpiW.KERNEL32(-00000004,ntuser.dat.log), ref: 00F96A9E
                                                      • lstrcmpiW.KERNEL32(-00000004,thumbs.db), ref: 00F96AAA
                                                      • lstrcmpiW.KERNEL32(-00000004,CRAB-DECRYPT.txt), ref: 00F96AB6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmpi$lstrlen
                                                      • String ID: CRAB-DECRYPT.txt$autorun.inf$boot.ini$bootsect.bak$desktop.ini$iconcache.db$ntuser.dat$ntuser.dat.log$thumbs.db
                                                      • API String ID: 203586893-3936223242
                                                      • Opcode ID: 63bf7948e49d05b7dae6dfb27fe07b2702aa7bd5a910e68ba6f2ae7faf5e477e
                                                      • Instruction ID: 155cd47c31c8a4dc9a6d92c1bdddf5f4d35ae5de0cf7cb1c979f5b8c14ea7c37
                                                      • Opcode Fuzzy Hash: 63bf7948e49d05b7dae6dfb27fe07b2702aa7bd5a910e68ba6f2ae7faf5e477e
                                                      • Instruction Fuzzy Hash: 52110853B4062A257E20F23D9C01DAF53CC5DD2BA43058235F900F2095EF8ACE1779B2
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000040), ref: 00F92AEA
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00F92B2C
                                                      • GetTempPathW.KERNEL32(00000100,00000000), ref: 00F92B38
                                                      • lstrlenW.KERNEL32(?,?,?,00000052), ref: 00F92B7D
                                                        • Part of subcall function 00F98730: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 00F9874D
                                                        • Part of subcall function 00F98730: VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00F9877B
                                                        • Part of subcall function 00F98730: GetModuleHandleA.KERNEL32(?), ref: 00F987CF
                                                        • Part of subcall function 00F98730: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00F987DD
                                                        • Part of subcall function 00F98730: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 00F987EC
                                                        • Part of subcall function 00F98730: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00F98835
                                                        • Part of subcall function 00F98730: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F98843
                                                      • GetEnvironmentVariableW.KERNEL32(AppData,00000000,00000100), ref: 00F92B9C
                                                      • lstrcatW.KERNEL32(00000000,\Microsoft\), ref: 00F92BE4
                                                      • lstrcatW.KERNEL32(00000000,?), ref: 00F92BEC
                                                      • lstrcatW.KERNEL32(00000000,.exe), ref: 00F92BF4
                                                      • wsprintfW.USER32 ref: 00F92C35
                                                      • ExitThread.KERNEL32 ref: 00F92C47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtuallstrcat$AllocContextCryptModule$AcquireAddressEnvironmentExitFileFreeHandleLibraryLoadNamePathProcReleaseTempThreadVariablelstrlenwsprintf
                                                      • String ID: "%s"$.exe$AppData$I$P$U$\Microsoft\
                                                      • API String ID: 139215849-2398311915
                                                      • Opcode ID: d5866ac42b75341a58ecf1b2faf12fa60408382dfe33e6784da17be57c867d43
                                                      • Instruction ID: 5226d760f56bd34c8c2c525b64f12d54f1a56769b9e882d98530ccde83ca9ab8
                                                      • Opcode Fuzzy Hash: d5866ac42b75341a58ecf1b2faf12fa60408382dfe33e6784da17be57c867d43
                                                      • Instruction Fuzzy Hash: 1E41CE71604304ABFB44DF20AC4AB6F7BD8AFC4714F040429B545D6292DBB8D948EBE7
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,00000000,00000000,00000000), ref: 00F952AD
                                                      • Sleep.KERNEL32(000003E8), ref: 00F952F0
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00F952FE
                                                      • VirtualAlloc.KERNEL32(00000000,00000000), ref: 00F9530E
                                                      • lstrcmpiA.KERNEL32(00000000,fabian wosar <3), ref: 00F9532A
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9533B
                                                      • wsprintfW.USER32 ref: 00F95353
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F95364
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocFree$Sleeplstrcmpilstrlenwsprintf
                                                      • String ID: alar$fabian wosar <3$it$m.bi$omwa$rans$re.b$t$zone
                                                      • API String ID: 2709691373-1552681713
                                                      • Opcode ID: 8d873da71dc55ef7b53e2fc36f9fc841e27b0fd0aa0fc0a96a427c1d4f0f7054
                                                      • Instruction ID: 8fff0cba036701f1fb5efd182ca2c4425053d45cf19514e732984c155cbac7dc
                                                      • Opcode Fuzzy Hash: 8d873da71dc55ef7b53e2fc36f9fc841e27b0fd0aa0fc0a96a427c1d4f0f7054
                                                      • Instruction Fuzzy Hash: 0A31B471E00318ABEF118FA5EC86BEE7BB8FF44714F100125FA16A72D0D7745A049B9A
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000201,00003000,00000040,00000000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F968BC
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F96914
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000002A,00000000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F9697E
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000002B,00000000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F969A6
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000024,00000000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F969C4
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000,?,?,00000000,?,00F96F26,00000000,?,?), ref: 00F969E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FolderPathSpecial$Virtual$AllocFree
                                                      • String ID: Ransomware$\All Users\$\Boot\$\IETldCache\$\Local Settings\$\Program Files\$\ProgramData\$\Tor Browser\$\Windows\
                                                      • API String ID: 4167578076-3735464813
                                                      • Opcode ID: 758ee544179d3d434d08f491e13cfea33f7dbb0363e2dd43b06d945ca3f4b879
                                                      • Instruction ID: f67b47353bb335aef07a6bb99cd3d874f99d7d0f27554962012e680f42e1560e
                                                      • Opcode Fuzzy Hash: 758ee544179d3d434d08f491e13cfea33f7dbb0363e2dd43b06d945ca3f4b879
                                                      • Instruction Fuzzy Hash: 8B314120B4071563FF2427664D66B2F659A8FD2B94F104026EA05DF2C6FEB8CD0376E6
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00F98139
                                                        • Part of subcall function 00F97FB0: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 00F9809A
                                                        • Part of subcall function 00F97FB0: lstrcatW.KERNEL32(00000000,00FA0584), ref: 00F98115
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00F9818F
                                                      • VirtualAlloc.KERNEL32(00000000,00000000), ref: 00F981A1
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00F981B1
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F981BB
                                                      • lstrcatW.KERNEL32(00000000,00FA0604), ref: 00F981D1
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00F9822C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9823A
                                                      • lstrcatW.KERNEL32(00000000,00F9FFF8), ref: 00F98280
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00F98288
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F98296
                                                      • lstrcatW.KERNEL32(00000000,00F9FFFC), ref: 00F982A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtual$Free$Alloc$CountTicklstrlen
                                                      • String ID: VUUU$VUUU
                                                      • API String ID: 2785072370-3149182767
                                                      • Opcode ID: 067dfe1daa6bf20867e2948ffcda57ade6f95afd7eb06d4c71cc324aaa6d6441
                                                      • Instruction ID: aeef5b641cdb6db2f11d17e5d9aced1187867719c8c7ab75667f4c9860afc324
                                                      • Opcode Fuzzy Hash: 067dfe1daa6bf20867e2948ffcda57ade6f95afd7eb06d4c71cc324aaa6d6441
                                                      • Instruction Fuzzy Hash: 19313FB3E042049BD71DAB29DC4AF3D76ACEB55314F05043DF502DB291CE78A941AF95
                                                      APIs
                                                        • Part of subcall function 00F982C0: InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F984A4
                                                        • Part of subcall function 00F982C0: InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 00F984BD
                                                        • Part of subcall function 00F95250: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,00000000,00000000,00000000), ref: 00F952AD
                                                        • Part of subcall function 00F95250: Sleep.KERNEL32(000003E8), ref: 00F952F0
                                                        • Part of subcall function 00F95250: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 00F952FE
                                                        • Part of subcall function 00F95250: VirtualAlloc.KERNEL32(00000000,00000000), ref: 00F9530E
                                                        • Part of subcall function 00F95250: lstrcmpiA.KERNEL32(00000000,fabian wosar <3), ref: 00F9532A
                                                        • Part of subcall function 00F95250: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9533B
                                                        • Part of subcall function 00F95250: wsprintfW.USER32 ref: 00F95353
                                                        • Part of subcall function 00F95250: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F95364
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00F95542
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00F95562
                                                      • VirtualAlloc.KERNEL32(00000000,00032001,00003000,00000040), ref: 00F95574
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 00F9558E
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F955E3
                                                      • lstrlenW.KERNEL32(?), ref: 00F955EF
                                                      • lstrlenA.KERNEL32(00000000,00000000,00031FFF,?,00000000), ref: 00F9560B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00000000,00000000,?,00000000), ref: 00F95665
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00F95671
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00F9567B
                                                      • InternetCloseHandle.WININET(00F9587A), ref: 00F95685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Freelstrlen$Alloc$Internet$Open$CloseHandleSleeplstrcatlstrcmpiwsprintf
                                                      • String ID: POST
                                                      • API String ID: 2554059081-1814004025
                                                      • Opcode ID: bee5f8c6119807f7521b8bc87b49e1453c8b057152132531c6a0424b736cd0f4
                                                      • Instruction ID: 2835ddabd33ac80122e4bb752528ff59700088a76a777bbd56ab4a01369d428a
                                                      • Opcode Fuzzy Hash: bee5f8c6119807f7521b8bc87b49e1453c8b057152132531c6a0424b736cd0f4
                                                      • Instruction Fuzzy Hash: 5941B072E0070AAAEF119FA8CC45FEEBB78FF88750F100116EA44B6250EB755685DB90
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97462
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9746D
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97483
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9748E
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974A4
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974AF
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974C5
                                                      • lstrlenW.KERNEL32(00F94B46,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974D0
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974E6
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F974F1
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97507
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97512
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97531
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F9753C
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97558
                                                      • lstrlenW.KERNEL32(?,?,?,?,00F94829,00000000,?,00000000,00000000,?,00000000), ref: 00F97566
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID:
                                                      • API String ID: 1659193697-0
                                                      • Opcode ID: 76d4b4f7edb8436398d75b5193e96ca11ef57caa2923608ea294cb6ea30b8da8
                                                      • Instruction ID: e87d0321075f46775e81bf372a3c032739e7dc996c65c7580a0a8ad69196a890
                                                      • Opcode Fuzzy Hash: 76d4b4f7edb8436398d75b5193e96ca11ef57caa2923608ea294cb6ea30b8da8
                                                      • Instruction Fuzzy Hash: 49410D32600755EFDB119FB9DD8C794BBA1BF04315F084535E41682A31D775A878EBC1
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,0000000A,00003000,00000004,00000000,00000000), ref: 00F96033
                                                      • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00F96048
                                                      • GetProcAddress.KERNEL32(00000000,RtlComputeCrc32), ref: 00F96059
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F96064
                                                      • wsprintfA.USER32 ref: 00F9607C
                                                      • _memset.LIBCMT ref: 00F9609B
                                                      • lstrlenA.KERNEL32(00000000), ref: 00F960A4
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F960D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtuallstrlen$AddressAllocFreeHandleModuleProc_memsetwsprintf
                                                      • String ID: %Xeuropol$RtlComputeCrc32$ntdll.dll
                                                      • API String ID: 218840185-1387466253
                                                      • Opcode ID: 57e426f9fcfc2c0b084e8ef693a40c240ab3fef28f0bf0c0b50ecc20442792eb
                                                      • Instruction ID: acaad0e9a0879e6a84802fb215d7224bda51ae642a3b89a70fe887764e3811e7
                                                      • Opcode Fuzzy Hash: 57e426f9fcfc2c0b084e8ef693a40c240ab3fef28f0bf0c0b50ecc20442792eb
                                                      • Instruction Fuzzy Hash: A5112B31E4020CBBEB215B64AC49FAE7F78AB54710F100065F905E21E0DAB45A84FF92
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000402,00003000,00000040,00000000,?,?,00000000,?,00F96F5F,00000000,?,?), ref: 00F96E65
                                                      • wsprintfW.USER32 ref: 00F96E73
                                                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000001,00000080,00000000,?,?), ref: 00F96E8F
                                                      • GetLastError.KERNEL32(?,?), ref: 00F96E9C
                                                      • lstrlenW.KERNEL32(?,?,00000000,?,?), ref: 00F96EBE
                                                      • WriteFile.KERNEL32(00000000,00000000,?,?), ref: 00F96ECE
                                                      • CloseHandle.KERNEL32(00000000,?,?), ref: 00F96ED5
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?), ref: 00F96EE8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileVirtual$AllocCloseCreateErrorFreeHandleLastWritelstrlenwsprintf
                                                      • String ID: %s\CRAB-DECRYPT.txt
                                                      • API String ID: 2985722263-2724392667
                                                      • Opcode ID: 64ff5d199592e66193be694388ef41f17931759c1aff441b1fe70d7b912b3deb
                                                      • Instruction ID: 37719f83a5eb100d11679e8ab81d6cb00f5ab8922126ae9f1555e93bf87d307f
                                                      • Opcode Fuzzy Hash: 64ff5d199592e66193be694388ef41f17931759c1aff441b1fe70d7b912b3deb
                                                      • Instruction Fuzzy Hash: 7E01D475380218BBF6211B74ED8FF6A3A6CEB45B15F100211FB05E51D0DBA56910AAAE
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,00000000,00000000,00F95519,00000000,?,?,?,?,00F95643,00000000,?,00000000), ref: 00F95396
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F953A8
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000200,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F953B8
                                                      • wsprintfW.USER32 ref: 00F953C9
                                                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00F953E3
                                                      • ExitProcess.KERNEL32 ref: 00F953EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual$ExecuteExitFileModuleNameProcessShellwsprintf
                                                      • String ID: /c timeout -c 5 & del "%s" /f /q$cmd.exe$open
                                                      • API String ID: 4033023619-516011104
                                                      • Opcode ID: 0600ed54ca91b0f010dfeb1ce1e1df2da46ece31845dad795e7084d6f37e609b
                                                      • Instruction ID: 84e60f1dcb918b0110eb585680da7499db0baf81c63073c081aa68d1eceec3b6
                                                      • Opcode Fuzzy Hash: 0600ed54ca91b0f010dfeb1ce1e1df2da46ece31845dad795e7084d6f37e609b
                                                      • Instruction Fuzzy Hash: 23F01C31BC172433F52217655C0BF0B3E589B85F66F240016B708FE1D189E09444ABEA
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(?,?,00F94817,00000000,?,00000000,00000000), ref: 00F93C6C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID: hdd$os_bit$os_major$pc_group$pc_keyb$pc_lang$pc_name$pc_user$ransom_id
                                                      • API String ID: 54951025-631784635
                                                      • Opcode ID: 1e8adacd97a0346e6265bee196685f6b21e81bd3c2aca05e40c19c45a681401d
                                                      • Instruction ID: 7f3db642b9f3154dee6eef22465d75978faa425965ae131564c256905c31f240
                                                      • Opcode Fuzzy Hash: 1e8adacd97a0346e6265bee196685f6b21e81bd3c2aca05e40c19c45a681401d
                                                      • Instruction Fuzzy Hash: 8A1150B4501B44CFDBA0CF69C584A8ABBF0BB08758B50592DE99AC7B11D3B9F448DF44
                                                      APIs
                                                        • Part of subcall function 00F97FB0: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 00F9809A
                                                        • Part of subcall function 00F97FB0: lstrcatW.KERNEL32(00000000,00FA0584), ref: 00F98115
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00F9822C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9823A
                                                      • lstrcatW.KERNEL32(00000000,00F9FFF8), ref: 00F98280
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00F98288
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F98296
                                                      • lstrcatW.KERNEL32(00000000,00F9FFFC), ref: 00F982A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtual$Free$Alloc
                                                      • String ID: VUUU$VUUU
                                                      • API String ID: 418921519-3149182767
                                                      • Opcode ID: 23f045b9e2483321a86d54b179c716ed38d7a68b4e61924ba395df23fe8a2ba9
                                                      • Instruction ID: 105d8d02fdac1eba8c1be51ac6a306861378d8c110809d655fd53ed1c379d5fe
                                                      • Opcode Fuzzy Hash: 23f045b9e2483321a86d54b179c716ed38d7a68b4e61924ba395df23fe8a2ba9
                                                      • Instruction Fuzzy Hash: 29110473A042089BD71DAB2CDC4AB39B7A8E751308F05482EF503DB1A1CE34A155AF95
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000A00,00003000,00000004,756EE0B0,?), ref: 00F935E9
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100,756F0440), ref: 00F93600
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00F93616
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00F93626
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00F93639
                                                      • ReadFile.KERNEL32(00000000,00000000,00000001,?,00000000), ref: 00F9364C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F9368D
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F93694
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F936A2
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileVirtual$AllocFree$CloseCreateHandleModuleNameReadSize
                                                      • String ID:
                                                      • API String ID: 2352497600-0
                                                      • Opcode ID: ef5122f29e3d9c40e6869e0dc4cdc80fccdddcbadbfe0ff50deb4f205f7b66e4
                                                      • Instruction ID: 286799eaca1470128365ea2fdc102e1b164479114a696f97ed24dea034bb34b5
                                                      • Opcode Fuzzy Hash: ef5122f29e3d9c40e6869e0dc4cdc80fccdddcbadbfe0ff50deb4f205f7b66e4
                                                      • Instruction Fuzzy Hash: 80213031B403087BFF255BA59C86FAE7B78EB44711F200059FB05B52D0CBB49A409F95
                                                      APIs
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97EF9
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F0B
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F1D
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F2F
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F41
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F53
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F65
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F77
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97F89
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,00F948BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00F97FA1
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 2f482115c25e6495cea2e1d14a3bbf8da4ca53cda7dab0831a1faf98bde2b4e4
                                                      • Instruction ID: f5e7b17f3b44cdd8763551fb8815038d639c08d18c15ed8571369b87c465090c
                                                      • Opcode Fuzzy Hash: 2f482115c25e6495cea2e1d14a3bbf8da4ca53cda7dab0831a1faf98bde2b4e4
                                                      • Instruction Fuzzy Hash: 7F21EF30654B04AAFB766B15DC0AF66B6E1BF40B15F254838E2C1348F08BF57899EF48
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000018,00003000,00000004), ref: 00F94020
                                                      • GetTickCount.KERNEL32 ref: 00F94045
                                                      • GetDriveTypeW.KERNEL32(?), ref: 00F9406A
                                                      • CreateThread.KERNEL32(00000000,00000000,00F970B0,?,00000000,00000000), ref: 00F940A9
                                                      • WaitForMultipleObjects.KERNEL32(00000000,?), ref: 00F940EB
                                                      • GetTickCount.KERNEL32 ref: 00F940F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountTick$AllocCreateDriveMultipleObjectsThreadTypeVirtualWait
                                                      • String ID: ?:\
                                                      • API String ID: 458387131-2533537817
                                                      • Opcode ID: 360bfa564486f0685acf15e62b4ebb99a2c8c1365dc4d99982e066dfa18ffcd5
                                                      • Instruction ID: 5dd8291c6ff111b780edcbbd413ac6424ac316e46ffc88dbd8afe47eec17f0a8
                                                      • Opcode Fuzzy Hash: 360bfa564486f0685acf15e62b4ebb99a2c8c1365dc4d99982e066dfa18ffcd5
                                                      • Instruction Fuzzy Hash: 1F5125719083009FD710CF18D884B5ABBE5FFD8324F504A2EFA8997360D775A984CB96
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000401,00003000,00000040), ref: 00F970C9
                                                      • wsprintfW.USER32 ref: 00F970DE
                                                      • InitializeCriticalSection.KERNEL32(?), ref: 00F970EC
                                                      • VirtualAlloc.KERNEL32 ref: 00F97120
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00009C40,00003000,00000004), ref: 00F9714D
                                                      • ExitThread.KERNEL32 ref: 00F97155
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$CriticalExitFreeInitializeSectionThreadwsprintf
                                                      • String ID: %c:\
                                                      • API String ID: 2059066847-3142399695
                                                      • Opcode ID: 21db8a6d0925ff6553e225a735ed59f37097c8b4a2ca50e8d4e3c21c61b085f9
                                                      • Instruction ID: 934ad4bb0c061ef3a16574055113b34cb2d3c1afe92ae88f39ee8b4614df46ff
                                                      • Opcode Fuzzy Hash: 21db8a6d0925ff6553e225a735ed59f37097c8b4a2ca50e8d4e3c21c61b085f9
                                                      • Instruction Fuzzy Hash: 5511D2B5244304BFE7109F54CC8AF1A3BA8AB84B21F004605FB649E1D1D7B4E554DFAB
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,7572F770,00000000,?,?,00F92C02), ref: 00F928AB
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,00F92C02), ref: 00F928BA
                                                      • CreateFileMappingW.KERNEL32(00000000,00000000,-00000008,00000000,00000000,00000000,?,?,00F92C02), ref: 00F928E5
                                                      • CloseHandle.KERNEL32(00000000,?,?,00F92C02), ref: 00F928F3
                                                      • MapViewOfFile.KERNEL32(00000000,7572F771,00000000,00000000,00000000,?,?,00F92C02), ref: 00F9290A
                                                      • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,00F92C02), ref: 00F92942
                                                      • CloseHandle.KERNEL32(?,?,?,00F92C02), ref: 00F92951
                                                      • CloseHandle.KERNEL32(00000000,?,?,00F92C02), ref: 00F92954
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateView$MappingSizeUnmap
                                                      • String ID:
                                                      • API String ID: 265113797-0
                                                      • Opcode ID: 62fac2241c1859bcdcca50d11b393266efc8139ffdf9eb2e2528cb65927a4a3d
                                                      • Instruction ID: 327187a992e84fae2b0e8bd7637041a1b46ec015c1d1e1798d8d6cdf15436560
                                                      • Opcode Fuzzy Hash: 62fac2241c1859bcdcca50d11b393266efc8139ffdf9eb2e2528cb65927a4a3d
                                                      • Instruction Fuzzy Hash: 1B212671E1111C7FFB106B749C86F7E776CDB45665F000226FC01E2290EA349D1169E1
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000010,00000000,00000000,?,00F96BFA), ref: 00F96AF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: %s
                                                      • API String ID: 1659193697-4273690596
                                                      • Opcode ID: 3a9517a2c8476ba1b617f48b16588d184a46e4ef533c651d4b534d2a153e2052
                                                      • Instruction ID: 8ce4e0a33a112678e425217a2baeae872155510e16c99df015083f4eb0670883
                                                      • Opcode Fuzzy Hash: 3a9517a2c8476ba1b617f48b16588d184a46e4ef533c651d4b534d2a153e2052
                                                      • Instruction Fuzzy Hash: 9E21DE72E012299BEF305F28AC017B673E8EBD5379F058226ED06D7190FBB59D41E690
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 00F92C8A
                                                      • BeginPaint.USER32(?,?), ref: 00F92C9F
                                                      • lstrlenW.KERNEL32(?), ref: 00F92CAC
                                                      • TextOutW.GDI32(00000000,00000005,00000005,?,00000000), ref: 00F92CBD
                                                      • EndPaint.USER32(?,?), ref: 00F92CCB
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00002AD0,00000000,00000000,00000000), ref: 00F92CE9
                                                      • DestroyWindow.USER32(?), ref: 00F92CF2
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PaintWindow$BeginCreateDestroyProcTextThreadlstrlen
                                                      • String ID:
                                                      • API String ID: 572880375-0
                                                      • Opcode ID: 0e25c8c77d2f696183914637ca44ae47510273d56e86846f540696ca9e095cfd
                                                      • Instruction ID: 4ad92ca7df797492c987c08a8cb67b7599bbf75dd69ae6356b4aa9f385e5fdde
                                                      • Opcode Fuzzy Hash: 0e25c8c77d2f696183914637ca44ae47510273d56e86846f540696ca9e095cfd
                                                      • Instruction Fuzzy Hash: 62115E3250420CABE711DF68EC09FAA7BA8FB48311F004617FA45D61A0E7719964EBD2
                                                      APIs
                                                      • _memset.LIBCMT ref: 00F94E39
                                                      • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,?,?,?,?,00000000), ref: 00F94E7F
                                                      • GetLastError.KERNEL32(?,?,00000000), ref: 00F94E89
                                                      • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00F94E9D
                                                      • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00F94EA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$CreateErrorLastProcess_memset
                                                      • String ID: D
                                                      • API String ID: 1393943095-2746444292
                                                      • Opcode ID: 0967344e7662a8b400a961de11c35c7e38457c90d1aff5c5330bbc9d55a6a62c
                                                      • Instruction ID: 7b4ae3bb8a5b6b152b414fa4656a4d1d7b6252914169cf05be5037ed7913d956
                                                      • Opcode Fuzzy Hash: 0967344e7662a8b400a961de11c35c7e38457c90d1aff5c5330bbc9d55a6a62c
                                                      • Instruction Fuzzy Hash: 71018471E4031CABEB20DBA8EC42BDE7BB8EF08714F104216FA08F6190E7B465548BD5
                                                      APIs
                                                      • lstrcmpiW.KERNEL32(00000002,00000024), ref: 00F94A95
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F94AA5
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F94AB4
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F94AC1
                                                      • Process32NextW.KERNEL32(?,00000000), ref: 00F94ADA
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00F94AF3
                                                      • CloseHandle.KERNEL32(?), ref: 00F94AFA
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess$FreeNextOpenProcess32TerminateVirtuallstrcmpi
                                                      • String ID:
                                                      • API String ID: 999196985-0
                                                      • Opcode ID: 45575ff0fc39a8f75b5c6a45dcd8e1ad630da8d5a3a2221d89dfa192f7565e0c
                                                      • Instruction ID: fd17994a3a306c91c86bd529349fa947009bd27aabaa3ab585632724ef25efb8
                                                      • Opcode Fuzzy Hash: 45575ff0fc39a8f75b5c6a45dcd8e1ad630da8d5a3a2221d89dfa192f7565e0c
                                                      • Instruction Fuzzy Hash: EA01F932240114AFEB209F50AC45F6A736CEFA4711F254115FE09D6060EB75AC06AFEA
                                                      APIs
                                                      • __init_pointers.LIBCMT ref: 00FD1A4C
                                                        • Part of subcall function 00FD1BFB: EncodePointer.KERNEL32(00000000,?,00FD1A51,00FD12AD,00FDFD50,00000014), ref: 00FD1BFE
                                                        • Part of subcall function 00FD1BFB: __initp_misc_winsig.LIBCMT ref: 00FD1C19
                                                        • Part of subcall function 00FD1BFB: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FD2EA5
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00FD2EB9
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00FD2ECC
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00FD2EDF
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00FD2EF2
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00FD2F05
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00FD2F18
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00FD2F2B
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00FD2F3E
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00FD2F51
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00FD2F64
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00FD2F77
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00FD2F8A
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00FD2F9D
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00FD2FB0
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00FD2FC3
                                                      • __mtinitlocks.LIBCMT ref: 00FD1A51
                                                      • __mtterm.LIBCMT ref: 00FD1A5A
                                                        • Part of subcall function 00FD1AC2: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00FD1A5F,00FD12AD,00FDFD50,00000014), ref: 00FD31BB
                                                        • Part of subcall function 00FD1AC2: _free.LIBCMT ref: 00FD31C2
                                                        • Part of subcall function 00FD1AC2: DeleteCriticalSection.KERNEL32(00FE1068,?,?,00FD1A5F,00FD12AD,00FDFD50,00000014), ref: 00FD31E4
                                                      • __calloc_crt.LIBCMT ref: 00FD1A7F
                                                      • __initptd.LIBCMT ref: 00FD1AA1
                                                      • GetCurrentThreadId.KERNEL32 ref: 00FD1AA8
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                      • String ID:
                                                      • API String ID: 3567560977-0
                                                      • Opcode ID: 6405ccc4a814573800a549d28fc162e67e54cf06079e9764ed0cd3e68d9e56bb
                                                      • Instruction ID: ee18717636b055cfe61792edee5497ce39623e6580926d584108df8498c16d0c
                                                      • Opcode Fuzzy Hash: 6405ccc4a814573800a549d28fc162e67e54cf06079e9764ed0cd3e68d9e56bb
                                                      • Instruction Fuzzy Hash: 06F06D32A1A65129E224BB747C0364A3797BB01771B2C061BF650D93D5FE288541B191
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00F93CB0
                                                      • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 00F93CC3
                                                      • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 00F93CCF
                                                      • FreeSid.ADVAPI32(?), ref: 00F93CEA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressAllocateFreeHandleInitializeModuleProc
                                                      • String ID: CheckTokenMembership$advapi32.dll
                                                      • API String ID: 3309497720-1888249752
                                                      • Opcode ID: 5bef1ffdf158b4c3fb9f9c878f82b653e11a41d35522c78fc7e4519cd5974659
                                                      • Instruction ID: f9ab542327d21a10b69ba31b0c438b639774bef2f4c93e4ea182014095123388
                                                      • Opcode Fuzzy Hash: 5bef1ffdf158b4c3fb9f9c878f82b653e11a41d35522c78fc7e4519cd5974659
                                                      • Instruction Fuzzy Hash: B3F0FF34E4030DBBEF109BE4DC0AFAD77B8EB04705F104595F905E6190E7745654AB96
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 00F9809A
                                                      • lstrcatW.KERNEL32(00000000,00FA0584), ref: 00F98115
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtuallstrcat
                                                      • String ID: eigh$ere$ore
                                                      • API String ID: 3624338217-3418171569
                                                      • Opcode ID: 3ec4b9b1a908b46f2fb295e3ed311dab6e3b380fcea2fbf75a4ea10b138b7bd9
                                                      • Instruction ID: 15dbd4bd1c96f1561e36a517804edfbc5ef6f27069e07f7900cd21030547a1e7
                                                      • Opcode Fuzzy Hash: 3ec4b9b1a908b46f2fb295e3ed311dab6e3b380fcea2fbf75a4ea10b138b7bd9
                                                      • Instruction Fuzzy Hash: 1B3132F1C012099FDB14CF84F848AADBEF4EB47318F284618E5146B242CFB4994AEF94
                                                      APIs
                                                      • lstrlenA.KERNEL32(00F95474,00000000,?,00F95475,?,00F934BF,00F95475,00000001,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000), ref: 00F93251
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,00F934BF,00F95475,00000001,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000), ref: 00F9325B
                                                      • HeapAlloc.KERNEL32(00000000,?,00F934BF,00F95475,00000001,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000), ref: 00F93262
                                                      • lstrlenA.KERNEL32(00F95474,00000000,?,00F95475,?,00F934BF,00F95475,00000001,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000), ref: 00F93273
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,00F934BF,00F95475,00000001,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000), ref: 00F9327D
                                                      • HeapAlloc.KERNEL32(00000000,?,00F934BF,00F95475,00000001,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000), ref: 00F93284
                                                      • lstrcpyA.KERNEL32(00000000,00F95474,?,00F934BF,00F95475,00000001,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000), ref: 00F93293
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocProcesslstrlen$lstrcpy
                                                      • String ID:
                                                      • API String ID: 511007297-0
                                                      • Opcode ID: cb3bb807c42615330acb245cb4a74ba6281fd49acdda3e9044ca705f7fd8c730
                                                      • Instruction ID: a8580429854ba32544fba151fc709e89971692237bc88cbe61124860933eae88
                                                      • Opcode Fuzzy Hash: cb3bb807c42615330acb245cb4a74ba6281fd49acdda3e9044ca705f7fd8c730
                                                      • Instruction Fuzzy Hash: EF11B6318082986EFF211F68980C766BB59EF12760F244046E8C5C7261C7368D86ABA2
                                                      APIs
                                                        • Part of subcall function 00F932B0: lstrlenA.KERNEL32(?,00000000,?,00F95474,?,?,00F933F6,00000000,00000000,?,?,00F95474,00000000), ref: 00F932C5
                                                        • Part of subcall function 00F932B0: lstrlenA.KERNEL32(?,?,00F933F6,00000000,00000000,?,?,00F95474,00000000,?,?,?,?,00F95643,00000000,?), ref: 00F932EE
                                                      • lstrlenA.KERNEL32(00F95475,00F95475,00000000,00000000,00000000,?,?,00F95474,00000000,?,?,?,?,00F95643,00000000,?), ref: 00F93484
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,00F95474,00000000,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F9348E
                                                      • HeapAlloc.KERNEL32(00000000,?,00F95474,00000000,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F93495
                                                      • lstrcpyA.KERNEL32(00000000,00F95475,?,00F95474,00000000,?,?,?,?,00F95643,00000000,?,00000000,00000000,?,00000000), ref: 00F934A7
                                                      • ExitProcess.KERNEL32 ref: 00F934DB
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$HeapProcess$AllocExitlstrcpy
                                                      • String ID:
                                                      • API String ID: 1867342102-0
                                                      • Opcode ID: 739e3193fd75e889820b19a4b6ff959abaa49ff8d40336c896a3267114000873
                                                      • Instruction ID: 28af2165daefebe0bc4bcb78ad512648d69f856a71bd8f0bb4b6810b101252a4
                                                      • Opcode Fuzzy Hash: 739e3193fd75e889820b19a4b6ff959abaa49ff8d40336c896a3267114000873
                                                      • Instruction Fuzzy Hash: 96312B30D042455AFF27CF6C98447797B65DB02320F19418AE8D5C7291D67A4E87BBA2
                                                      APIs
                                                      • _memset.LIBCMT ref: 00F93D52
                                                      • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00F93D76
                                                      • VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00F93D7A
                                                      • VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00F93D7E
                                                      • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00F93DA5
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$InfoVerifyVersion_memset
                                                      • String ID:
                                                      • API String ID: 3299124433-0
                                                      • Opcode ID: 1e7d3998864721a80d1b78a92f71d3ceaad0b197ce0aa22cd9db244449a5238b
                                                      • Instruction ID: b56f579d01d664f0aa0f574477b7897f107f9a48583364768d15744f2f7b3ec1
                                                      • Opcode Fuzzy Hash: 1e7d3998864721a80d1b78a92f71d3ceaad0b197ce0aa22cd9db244449a5238b
                                                      • Instruction Fuzzy Hash: 49111BB0D4031C6EEB619F65DC0ABEA7ABCEB08700F008199A608E61C1D6B84B948FD5
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,00FD1B1E,00000000,?,00FD4E28,000000FF,0000001E,00000000,00000000,00000000,?,00FD3385), ref: 00FD1AEE
                                                      • GetProcAddress.KERNEL32(?,CorExitProcess), ref: 00FD1B00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 1646373207-1276376045
                                                      • Opcode ID: eccdd178e8e2c9f56d34adefa2d811054299e28ee71fe997b9f8c70216b9eef3
                                                      • Instruction ID: 231d15481f79ffcd6e22c26b64e01cc446cd2f7cac17fdf3d1a27bb029db8a41
                                                      • Opcode Fuzzy Hash: eccdd178e8e2c9f56d34adefa2d811054299e28ee71fe997b9f8c70216b9eef3
                                                      • Instruction Fuzzy Hash: DBD0123174420EFBDB005BA5DC06F597B6FAB41752F044157F804E1250EA71DA10F6A1
                                                      APIs
                                                      • lstrcpyA.KERNEL32(?,fabian wosar <3,?,00F95218), ref: 00F94F23
                                                      • lstrlenA.KERNEL32(00000000,?,00F95218), ref: 00F94F7F
                                                      • lstrcpyA.KERNEL32(?,?,?,00F95218), ref: 00F94FAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen
                                                      • String ID: fabian wosar <3
                                                      • API String ID: 367037083-1724090804
                                                      • Opcode ID: 139ed242759f1a93580d859044872b97bd57eb66465dd3de38a632e57d67f57a
                                                      • Instruction ID: 1ce9b6191b832fb43c0653c88aa96176593e40630886d76d2880133cb185bb1b
                                                      • Opcode Fuzzy Hash: 139ed242759f1a93580d859044872b97bd57eb66465dd3de38a632e57d67f57a
                                                      • Instruction Fuzzy Hash: FC312322C0819A5EEF328F285840BFABFE1AF6736DF58009AD8D5C7215D3212847E790
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FD73B0
                                                      • __isleadbyte_l.LIBCMT ref: 00FD73DE
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000), ref: 00FD740C
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000), ref: 00FD7442
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 2ca933369b502092202da194a3e7a68c40d75dab3ce013aa95d75aa07d974747
                                                      • Instruction ID: 074de734c3d0b9f37ee6af8eafc4742fcda3c0eb3dacefe04e2294ad9c2dd922
                                                      • Opcode Fuzzy Hash: 2ca933369b502092202da194a3e7a68c40d75dab3ce013aa95d75aa07d974747
                                                      • Instruction Fuzzy Hash: A2318431A08346EFDB22EE65CC45B6A7FA7AF41320F19451AE8549B290F731D850F750
                                                      APIs
                                                      • _free.LIBCMT ref: 00FD4EAC
                                                        • Part of subcall function 00FD4DFB: __FF_MSGBANNER.LIBCMT ref: 00FD4E12
                                                        • Part of subcall function 00FD4DFB: __NMSG_WRITE.LIBCMT ref: 00FD4E19
                                                        • Part of subcall function 00FD4DFB: HeapAlloc.KERNEL32(01210000,00000000,00000001,00000000,00000000,00000000,?,00FD3385,00000000,00000000,00000000,00000000,?,00FD323A,00000018,00FDFE20), ref: 00FD4E3E
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocHeap_free
                                                      • String ID:
                                                      • API String ID: 1080816511-0
                                                      • Opcode ID: 23d789c686f58522c5286ee17a11d0718fcb3394a012ea8fb89a341c937fead2
                                                      • Instruction ID: 257afde2d162f4e025d353d02cdc22eb3793c3cbfb3961ad2a0fcec27e2ce097
                                                      • Opcode Fuzzy Hash: 23d789c686f58522c5286ee17a11d0718fcb3394a012ea8fb89a341c937fead2
                                                      • Instruction Fuzzy Hash: 4F117733905215ABCB317F74BC0A75A379BAF40370B184527FA45D7361DB35A840B6A5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1671034739.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000000F.00000002.1671018492.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671051955.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671067110.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1671088593.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: a8292b613ccd047416a34022aaf5a22d8ab77da8b922757973516e6eda3415f7
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: F501397241514EFBCF126F84CD428EE3F27BB18394B588516FA5858231C636C9B2BB91
                                                      APIs
                                                      • lstrcmpiA.KERNEL32(00F95474,mask), ref: 00F931B9
                                                      • lstrcmpiA.KERNEL32(00F95474,pub_key), ref: 00F931D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1670976983.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_f90000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmpi
                                                      • String ID: mask$pub_key
                                                      • API String ID: 1586166983-1355590148
                                                      • Opcode ID: bcea0d06e80f3fa9bea726febc81da29d0354f890af5944e4ad4043acf9fb7f0
                                                      • Instruction ID: 6aedbd83b113cf957a34420989105b5aa34b744f2864a735b2e22ad42f661470
                                                      • Opcode Fuzzy Hash: bcea0d06e80f3fa9bea726febc81da29d0354f890af5944e4ad4043acf9fb7f0
                                                      • Instruction Fuzzy Hash: B2F02B72B082881EFF294B6C9C457A1BBDD9B55320F54047FE6C9C21B0C6AACDC1E396

                                                      Execution Graph

                                                      Execution Coverage:3.7%
                                                      Dynamic/Decrypted Code Coverage:45.4%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:1523
                                                      Total number of Limit Nodes:76
                                                      execution_graph 9738 fd123b 9739 fd1247 __mtinitlocknum 9738->9739 9773 fd1de0 GetProcessHeap 9739->9773 9741 fd12a7 9774 fd1a4c 9741->9774 9742 fd129c 9742->9741 9867 fd138f 9742->9867 9745 fd12ad 9746 fd12b8 __RTC_Initialize 9745->9746 9747 fd138f _fast_error_exit 58 API calls 9745->9747 9795 fd1df5 9746->9795 9747->9746 9749 fd12c7 9750 fd12d3 GetCommandLineA 9749->9750 9751 fd138f _fast_error_exit 58 API calls 9749->9751 9814 fd26fc GetEnvironmentStringsW 9750->9814 9753 fd12d2 9751->9753 9753->9750 9757 fd12f8 9838 fd22d8 9757->9838 9761 fd1309 9854 fd1b63 9761->9854 9763 fd1b29 __lock 58 API calls 9763->9761 9764 fd1311 9765 fd131c 9764->9765 9766 fd1b29 __lock 58 API calls 9764->9766 9860 fd11a8 OpenProcess GetLastError 9765->9860 9766->9765 9773->9742 9882 fd1bfb EncodePointer 9774->9882 9776 fd1a51 9887 fd32a1 9776->9887 9778 fd1a5a 9891 fd1ac2 9778->9891 9784 fd1a77 9903 fd3327 9784->9903 9787 fd1ab9 9788 fd1ac2 __mtterm 61 API calls 9787->9788 9790 fd1abe 9788->9790 9790->9745 9791 fd1a98 9791->9787 9792 fd1a9e 9791->9792 9912 fd1999 9792->9912 9794 fd1aa6 GetCurrentThreadId 9794->9745 9796 fd1e01 __mtinitlocknum 9795->9796 9797 fd3170 __lock 58 API calls 9796->9797 9798 fd1e08 9797->9798 9799 fd3327 __calloc_crt 58 API calls 9798->9799 9801 fd1e19 9799->9801 9800 fd1e84 GetStartupInfoW 9808 fd1e99 9800->9808 9809 fd1fc8 9800->9809 9801->9800 9802 fd1e24 __mtinitlocknum @_EH4_CallFilterFunc@8 9801->9802 9802->9749 9803 fd2090 10174 fd20a0 9803->10174 9805 fd3327 __calloc_crt 58 API calls 9805->9808 9806 fd2015 GetStdHandle 9806->9809 9807 fd2028 GetFileType 9807->9809 9808->9805 9808->9809 9810 fd1ee7 9808->9810 9809->9803 9809->9806 9809->9807 9813 fd2e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9809->9813 9810->9809 9811 fd1f1b GetFileType 9810->9811 9812 fd2e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9810->9812 9811->9810 9812->9810 9813->9809 9816 fd270f 9814->9816 9820 fd12e3 9814->9820 9815 fd2727 WideCharToMultiByte 9817 fd2779 FreeEnvironmentStringsW 9815->9817 9818 fd2742 9815->9818 9816->9815 9816->9816 9817->9820 9819 fd336f __malloc_crt 58 API calls 9818->9819 9821 fd2748 9819->9821 9827 fd20a9 9820->9827 9821->9817 9822 fd274f WideCharToMultiByte 9821->9822 9823 fd276e FreeEnvironmentStringsW 9822->9823 9824 fd2765 9822->9824 9823->9820 9825 fd32ef _free 58 API calls 9824->9825 9826 fd276b 9825->9826 9826->9823 9828 fd20bc GetModuleFileNameA 9827->9828 9829 fd20b7 9827->9829 9831 fd20e9 9828->9831 10184 fd375a 9829->10184 10178 fd215c 9831->10178 9834 fd336f __malloc_crt 58 API calls 9835 fd2122 9834->9835 9836 fd215c _parse_cmdline 58 API calls 9835->9836 9837 fd12ed 9835->9837 9836->9837 9837->9757 9875 fd1b29 9837->9875 9839 fd22e1 9838->9839 9842 fd22e6 _strlen 9838->9842 9840 fd375a ___initmbctable 71 API calls 9839->9840 9840->9842 9841 fd3327 __calloc_crt 58 API calls 9850 fd231c _strlen 9841->9850 9842->9841 9845 fd12fe 9842->9845 9843 fd236e 9844 fd32ef _free 58 API calls 9843->9844 9844->9845 9845->9761 9845->9763 9846 fd3327 __calloc_crt 58 API calls 9846->9850 9847 fd2395 9848 fd32ef _free 58 API calls 9847->9848 9848->9845 9850->9843 9850->9845 9850->9846 9850->9847 9851 fd23ac 9850->9851 10604 fd4942 9850->10604 9852 fd4041 __invoke_watson 8 API calls 9851->9852 9853 fd23b8 9852->9853 9856 fd1b6f __IsNonwritableInCurrentImage 9854->9856 10613 fd4381 9856->10613 9857 fd1b8d __initterm_e 9859 fd1bac _doexit __IsNonwritableInCurrentImage 9857->9859 10616 fd436c 9857->10616 9859->9764 9861 fd120a 9860->9861 9862 fd1203 9860->9862 10682 fd1113 9861->10682 9863 fd1204 ExitProcess 9862->9863 9866 fd1234 ExitThread 9868 fd139b 9867->9868 9869 fd13a0 9867->9869 9871 fd23b9 __FF_MSGBANNER 58 API calls 9868->9871 9870 fd2416 __NMSG_WRITE 58 API calls 9869->9870 9872 fd13a8 9870->9872 9871->9869 9873 fd1b13 __mtinitlocknum 3 API calls 9872->9873 9874 fd13b2 9873->9874 9874->9741 9876 fd23b9 __FF_MSGBANNER 58 API calls 9875->9876 9877 fd1b31 9876->9877 9878 fd2416 __NMSG_WRITE 58 API calls 9877->9878 9879 fd1b39 9878->9879 11513 fd1be7 9879->11513 9883 fd1c0c __init_pointers __initp_misc_winsig 9882->9883 9922 fd2d9f EncodePointer 9883->9922 9885 fd1c24 __init_pointers 9886 fd2e9e 34 API calls 9885->9886 9886->9776 9888 fd32ad 9887->9888 9890 fd1a56 9888->9890 9923 fd2e2e 9888->9923 9890->9778 9900 fd2db0 9890->9900 9892 fd1acc 9891->9892 9893 fd1ad2 9891->9893 9926 fd2dce 9892->9926 9895 fd31ba DeleteCriticalSection 9893->9895 9896 fd31d6 9893->9896 9929 fd32ef 9895->9929 9898 fd31e2 DeleteCriticalSection 9896->9898 9899 fd1a5f 9896->9899 9898->9896 9899->9745 9901 fd2dc7 TlsAlloc 9900->9901 9902 fd1a6c 9900->9902 9902->9778 9902->9784 9905 fd332e 9903->9905 9906 fd1a84 9905->9906 9908 fd334c 9905->9908 9955 fd4f38 9905->9955 9906->9787 9909 fd2e0c 9906->9909 9908->9905 9908->9906 9963 fd3137 Sleep 9908->9963 9910 fd2e26 TlsSetValue 9909->9910 9911 fd2e22 9909->9911 9910->9791 9911->9791 9913 fd19a5 __mtinitlocknum 9912->9913 9966 fd3170 9913->9966 9915 fd19e2 9973 fd1a3a 9915->9973 9918 fd3170 __lock 58 API calls 9919 fd1a03 ___addlocaleref 9918->9919 9976 fd1a43 9919->9976 9921 fd1a2e __mtinitlocknum 9921->9794 9922->9885 9924 fd2e3e 9923->9924 9925 fd2e4b InitializeCriticalSectionAndSpinCount 9923->9925 9924->9888 9925->9888 9927 fd2de5 TlsFree 9926->9927 9928 fd2de1 9926->9928 9927->9893 9928->9893 9930 fd32f8 HeapFree 9929->9930 9934 fd3321 _free 9929->9934 9931 fd330d 9930->9931 9930->9934 9935 fd40a0 9931->9935 9934->9893 9938 fd192a GetLastError 9935->9938 9937 fd3313 GetLastError 9937->9934 9952 fd2ded 9938->9952 9940 fd193f 9941 fd198d SetLastError 9940->9941 9942 fd3327 __calloc_crt 55 API calls 9940->9942 9941->9937 9943 fd1952 9942->9943 9943->9941 9944 fd2e0c __getptd_noexit TlsSetValue 9943->9944 9945 fd1966 9944->9945 9946 fd196c 9945->9946 9947 fd1984 9945->9947 9948 fd1999 __initptd 55 API calls 9946->9948 9949 fd32ef _free 55 API calls 9947->9949 9950 fd1974 GetCurrentThreadId 9948->9950 9951 fd198a 9949->9951 9950->9941 9951->9941 9953 fd2e04 TlsGetValue 9952->9953 9954 fd2e00 9952->9954 9953->9940 9954->9940 9956 fd4f43 9955->9956 9962 fd4f5e 9955->9962 9957 fd4f4f 9956->9957 9956->9962 9958 fd40a0 __cftof_l 57 API calls 9957->9958 9960 fd4f54 9958->9960 9959 fd4f6e HeapAlloc 9959->9960 9959->9962 9960->9905 9962->9959 9962->9960 9964 fd43a0 DecodePointer 9962->9964 9963->9908 9965 fd43b3 9964->9965 9965->9962 9967 fd3194 EnterCriticalSection 9966->9967 9968 fd3181 9966->9968 9967->9915 9979 fd31f8 9968->9979 9970 fd3187 9970->9967 9971 fd1b29 __lock 57 API calls 9970->9971 9972 fd3193 9971->9972 9972->9967 10172 fd32da LeaveCriticalSection 9973->10172 9975 fd19fc 9975->9918 10173 fd32da LeaveCriticalSection 9976->10173 9978 fd1a4a 9978->9921 9980 fd3204 __mtinitlocknum 9979->9980 9994 fd3223 9980->9994 10001 fd23b9 9980->10001 9987 fd3241 9991 fd40a0 __cftof_l 58 API calls 9987->9991 9988 fd3250 9989 fd3170 __lock 58 API calls 9988->9989 9993 fd3257 9989->9993 9992 fd3246 __mtinitlocknum 9991->9992 9992->9970 9995 fd327c 9993->9995 9996 fd3264 9993->9996 9994->9992 10043 fd336f 9994->10043 9998 fd32ef _free 58 API calls 9995->9998 9997 fd2e2e __mtinitlocknum InitializeCriticalSectionAndSpinCount 9996->9997 9999 fd3270 9997->9999 9998->9999 10049 fd3298 9999->10049 10052 fd25e0 10001->10052 10003 fd23c0 10004 fd25e0 __NMSG_WRITE 58 API calls 10003->10004 10008 fd23cd 10003->10008 10004->10008 10005 fd2416 __NMSG_WRITE 58 API calls 10006 fd23e5 10005->10006 10009 fd2416 __NMSG_WRITE 58 API calls 10006->10009 10007 fd23ef 10010 fd2416 10007->10010 10008->10005 10008->10007 10009->10007 10011 fd2434 __NMSG_WRITE 10010->10011 10012 fd25e0 __NMSG_WRITE 55 API calls 10011->10012 10017 fd255b 10011->10017 10014 fd2447 10012->10014 10016 fd2560 GetStdHandle 10014->10016 10018 fd25e0 __NMSG_WRITE 55 API calls 10014->10018 10015 fd25c4 10040 fd1b13 10015->10040 10016->10017 10021 fd256e _strlen 10016->10021 10134 fd13c0 10017->10134 10019 fd2458 10018->10019 10019->10016 10020 fd246a 10019->10020 10020->10017 10082 fd4a97 10020->10082 10021->10017 10023 fd25a7 WriteFile 10021->10023 10023->10017 10025 fd25c8 10027 fd4041 __invoke_watson 8 API calls 10025->10027 10026 fd2497 GetModuleFileNameW 10028 fd24b7 10026->10028 10032 fd24c7 __NMSG_WRITE 10026->10032 10030 fd25d2 10027->10030 10029 fd4a97 __NMSG_WRITE 55 API calls 10028->10029 10029->10032 10031 fd250d 10031->10025 10100 fd4a2b 10031->10100 10032->10025 10032->10031 10091 fd4b0c 10032->10091 10036 fd4a2b __NMSG_WRITE 55 API calls 10037 fd2544 10036->10037 10037->10025 10038 fd254b 10037->10038 10109 fd4bca EncodePointer 10038->10109 10149 fd1adf GetModuleHandleExW 10040->10149 10045 fd337d 10043->10045 10046 fd323a 10045->10046 10048 fd3390 10045->10048 10152 fd4dfb 10045->10152 10046->9987 10046->9988 10048->10045 10048->10046 10170 fd3137 Sleep 10048->10170 10171 fd32da LeaveCriticalSection 10049->10171 10051 fd329f 10051->9992 10053 fd25ea 10052->10053 10054 fd40a0 __cftof_l 58 API calls 10053->10054 10055 fd25f4 10053->10055 10056 fd2610 10054->10056 10055->10003 10059 fd4031 10056->10059 10062 fd4006 DecodePointer 10059->10062 10063 fd4019 10062->10063 10068 fd4041 IsProcessorFeaturePresent 10063->10068 10066 fd4006 __cftof_l 8 API calls 10067 fd261b 10066->10067 10067->10003 10069 fd404c 10068->10069 10074 fd3ed2 10069->10074 10073 fd4030 10073->10066 10075 fd3eec ___raise_securityfailure _memset 10074->10075 10076 fd3f0c IsDebuggerPresent 10075->10076 10077 fd315a ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter 10076->10077 10080 fd3fd0 ___raise_securityfailure 10077->10080 10078 fd13c0 __cftof_l 6 API calls 10079 fd3ff3 10078->10079 10081 fd3145 GetCurrentProcess TerminateProcess 10079->10081 10080->10078 10081->10073 10083 fd4ab0 10082->10083 10084 fd4aa2 10082->10084 10085 fd40a0 __cftof_l 58 API calls 10083->10085 10084->10083 10088 fd4ac9 10084->10088 10086 fd4aba 10085->10086 10087 fd4031 __cftof_l 9 API calls 10086->10087 10089 fd248a 10087->10089 10088->10089 10090 fd40a0 __cftof_l 58 API calls 10088->10090 10089->10025 10089->10026 10090->10086 10095 fd4b1a 10091->10095 10092 fd4b1e 10093 fd4b23 10092->10093 10094 fd40a0 __cftof_l 58 API calls 10092->10094 10093->10031 10096 fd4b4e 10094->10096 10095->10092 10095->10093 10098 fd4b5d 10095->10098 10097 fd4031 __cftof_l 9 API calls 10096->10097 10097->10093 10098->10093 10099 fd40a0 __cftof_l 58 API calls 10098->10099 10099->10096 10101 fd4a45 10100->10101 10103 fd4a37 10100->10103 10102 fd40a0 __cftof_l 58 API calls 10101->10102 10108 fd4a4f 10102->10108 10103->10101 10106 fd4a71 10103->10106 10104 fd4031 __cftof_l 9 API calls 10105 fd252d 10104->10105 10105->10025 10105->10036 10106->10105 10107 fd40a0 __cftof_l 58 API calls 10106->10107 10107->10108 10108->10104 10110 fd4bfe ___crtIsPackagedApp 10109->10110 10111 fd4cbd IsDebuggerPresent 10110->10111 10112 fd4c0d LoadLibraryExW 10110->10112 10115 fd4cc7 10111->10115 10116 fd4ce2 10111->10116 10113 fd4c4a GetProcAddress 10112->10113 10114 fd4c24 GetLastError 10112->10114 10120 fd4c5e 7 API calls 10113->10120 10124 fd4cda 10113->10124 10119 fd4c33 LoadLibraryExW 10114->10119 10114->10124 10117 fd4cd5 10115->10117 10121 fd4cce OutputDebugStringW 10115->10121 10116->10117 10118 fd4ce7 DecodePointer 10116->10118 10117->10124 10128 fd4d0e DecodePointer DecodePointer 10117->10128 10132 fd4d26 10117->10132 10118->10124 10119->10113 10119->10124 10122 fd4cba 10120->10122 10123 fd4ca6 GetProcAddress EncodePointer 10120->10123 10121->10117 10122->10111 10123->10122 10127 fd13c0 __cftof_l 6 API calls 10124->10127 10125 fd4d5e DecodePointer 10126 fd4d4a DecodePointer 10125->10126 10129 fd4d65 10125->10129 10126->10124 10130 fd4dac 10127->10130 10128->10132 10129->10126 10133 fd4d76 DecodePointer 10129->10133 10130->10017 10132->10125 10132->10126 10133->10126 10135 fd13c8 10134->10135 10136 fd13ca IsProcessorFeaturePresent 10134->10136 10135->10015 10138 fd29d5 10136->10138 10141 fd2984 IsDebuggerPresent 10138->10141 10142 fd2999 ___raise_securityfailure 10141->10142 10147 fd315a SetUnhandledExceptionFilter UnhandledExceptionFilter 10142->10147 10144 fd29a1 ___raise_securityfailure 10148 fd3145 GetCurrentProcess TerminateProcess 10144->10148 10146 fd29be 10146->10015 10147->10144 10148->10146 10150 fd1b0a ExitProcess 10149->10150 10151 fd1af8 GetProcAddress 10149->10151 10151->10150 10153 fd4e07 10152->10153 10154 fd4e76 10152->10154 10156 fd4e12 10153->10156 10155 fd43a0 __calloc_impl DecodePointer 10154->10155 10157 fd4e7c 10155->10157 10156->10153 10158 fd23b9 __FF_MSGBANNER 57 API calls 10156->10158 10160 fd4e3a HeapAlloc 10156->10160 10161 fd2416 __NMSG_WRITE 57 API calls 10156->10161 10164 fd4e62 10156->10164 10165 fd43a0 __calloc_impl DecodePointer 10156->10165 10167 fd1b13 __mtinitlocknum 3 API calls 10156->10167 10168 fd4e60 10156->10168 10159 fd40a0 __cftof_l 57 API calls 10157->10159 10158->10156 10163 fd4e82 10159->10163 10160->10156 10162 fd4e6e 10160->10162 10161->10156 10162->10163 10163->10045 10166 fd40a0 __cftof_l 57 API calls 10164->10166 10165->10156 10166->10168 10167->10156 10169 fd40a0 __cftof_l 57 API calls 10168->10169 10169->10162 10170->10048 10171->10051 10172->9975 10173->9978 10177 fd32da LeaveCriticalSection 10174->10177 10176 fd20a7 10176->9802 10177->10176 10180 fd217e 10178->10180 10183 fd21e2 10180->10183 10188 fd492c 10180->10188 10181 fd20ff 10181->9834 10181->9837 10182 fd492c _parse_cmdline 58 API calls 10182->10183 10183->10181 10183->10182 10185 fd376a 10184->10185 10186 fd3763 10184->10186 10185->9828 10492 fd3b3f 10186->10492 10191 fd48d2 10188->10191 10194 fd3778 10191->10194 10193 fd48e4 10193->10180 10195 fd3789 10194->10195 10196 fd37d6 10194->10196 10202 fd1912 10195->10202 10196->10193 10199 fd37b6 10199->10196 10222 fd3a99 10199->10222 10203 fd192a __getptd_noexit 58 API calls 10202->10203 10204 fd1918 10203->10204 10205 fd1925 10204->10205 10206 fd1b29 __lock 58 API calls 10204->10206 10205->10199 10207 fd368f 10205->10207 10206->10205 10208 fd369b __mtinitlocknum 10207->10208 10209 fd1912 _LocaleUpdate::_LocaleUpdate 58 API calls 10208->10209 10210 fd36a4 10209->10210 10211 fd36d3 10210->10211 10213 fd36b7 10210->10213 10212 fd3170 __lock 58 API calls 10211->10212 10214 fd36da 10212->10214 10215 fd1912 _LocaleUpdate::_LocaleUpdate 58 API calls 10213->10215 10234 fd370f 10214->10234 10217 fd36bc 10215->10217 10220 fd36ca __mtinitlocknum 10217->10220 10221 fd1b29 __lock 58 API calls 10217->10221 10220->10199 10221->10220 10223 fd3aa5 __mtinitlocknum 10222->10223 10224 fd1912 _LocaleUpdate::_LocaleUpdate 58 API calls 10223->10224 10225 fd3aaf 10224->10225 10226 fd3170 __lock 58 API calls 10225->10226 10227 fd3ac1 10225->10227 10232 fd3adf 10226->10232 10229 fd3acf __mtinitlocknum 10227->10229 10231 fd1b29 __lock 58 API calls 10227->10231 10228 fd3b0c 10488 fd3b36 10228->10488 10229->10196 10231->10229 10232->10228 10233 fd32ef _free 58 API calls 10232->10233 10233->10228 10235 fd36ee 10234->10235 10236 fd371a ___addlocaleref ___removelocaleref 10234->10236 10238 fd3706 10235->10238 10236->10235 10241 fd3495 10236->10241 10487 fd32da LeaveCriticalSection 10238->10487 10240 fd370d 10240->10217 10242 fd350e 10241->10242 10248 fd34aa 10241->10248 10243 fd355b 10242->10243 10244 fd32ef _free 58 API calls 10242->10244 10259 fd3584 10243->10259 10311 fd5115 10243->10311 10246 fd352f 10244->10246 10247 fd32ef _free 58 API calls 10246->10247 10250 fd3542 10247->10250 10248->10242 10252 fd32ef _free 58 API calls 10248->10252 10269 fd34db 10248->10269 10257 fd32ef _free 58 API calls 10250->10257 10251 fd32ef _free 58 API calls 10258 fd3503 10251->10258 10260 fd34d0 10252->10260 10253 fd32ef _free 58 API calls 10253->10259 10254 fd35e3 10255 fd32ef _free 58 API calls 10254->10255 10261 fd35e9 10255->10261 10256 fd32ef _free 58 API calls 10262 fd34ee 10256->10262 10263 fd3550 10257->10263 10264 fd32ef _free 58 API calls 10258->10264 10259->10254 10265 fd32ef 58 API calls _free 10259->10265 10271 fd4fb2 10260->10271 10261->10235 10299 fd50ae 10262->10299 10268 fd32ef _free 58 API calls 10263->10268 10264->10242 10265->10259 10268->10243 10269->10256 10270 fd34f9 10269->10270 10270->10251 10272 fd4fc1 10271->10272 10298 fd50aa 10271->10298 10273 fd4fd2 10272->10273 10274 fd32ef _free 58 API calls 10272->10274 10275 fd4fe4 10273->10275 10276 fd32ef _free 58 API calls 10273->10276 10274->10273 10277 fd4ff6 10275->10277 10279 fd32ef _free 58 API calls 10275->10279 10276->10275 10278 fd5008 10277->10278 10280 fd32ef _free 58 API calls 10277->10280 10281 fd32ef _free 58 API calls 10278->10281 10283 fd501a 10278->10283 10279->10277 10280->10278 10281->10283 10282 fd502c 10285 fd503e 10282->10285 10287 fd32ef _free 58 API calls 10282->10287 10283->10282 10284 fd32ef _free 58 API calls 10283->10284 10284->10282 10286 fd5050 10285->10286 10288 fd32ef _free 58 API calls 10285->10288 10289 fd5062 10286->10289 10290 fd32ef _free 58 API calls 10286->10290 10287->10285 10288->10286 10291 fd5074 10289->10291 10292 fd32ef _free 58 API calls 10289->10292 10290->10289 10293 fd5086 10291->10293 10295 fd32ef _free 58 API calls 10291->10295 10292->10291 10294 fd5098 10293->10294 10296 fd32ef _free 58 API calls 10293->10296 10297 fd32ef _free 58 API calls 10294->10297 10294->10298 10295->10293 10296->10294 10297->10298 10298->10269 10300 fd50b9 10299->10300 10310 fd5111 10299->10310 10301 fd50c9 10300->10301 10302 fd32ef _free 58 API calls 10300->10302 10303 fd32ef _free 58 API calls 10301->10303 10304 fd50db 10301->10304 10302->10301 10303->10304 10305 fd32ef _free 58 API calls 10304->10305 10306 fd50ed 10304->10306 10305->10306 10307 fd50ff 10306->10307 10308 fd32ef _free 58 API calls 10306->10308 10309 fd32ef _free 58 API calls 10307->10309 10307->10310 10308->10307 10309->10310 10310->10270 10312 fd5124 10311->10312 10313 fd3579 10311->10313 10314 fd32ef _free 58 API calls 10312->10314 10313->10253 10315 fd512c 10314->10315 10316 fd32ef _free 58 API calls 10315->10316 10317 fd5134 10316->10317 10318 fd32ef _free 58 API calls 10317->10318 10319 fd513c 10318->10319 10320 fd32ef _free 58 API calls 10319->10320 10321 fd5144 10320->10321 10322 fd32ef _free 58 API calls 10321->10322 10323 fd514c 10322->10323 10324 fd32ef _free 58 API calls 10323->10324 10325 fd5154 10324->10325 10326 fd32ef _free 58 API calls 10325->10326 10327 fd515b 10326->10327 10328 fd32ef _free 58 API calls 10327->10328 10329 fd5163 10328->10329 10330 fd32ef _free 58 API calls 10329->10330 10331 fd516b 10330->10331 10332 fd32ef _free 58 API calls 10331->10332 10333 fd5173 10332->10333 10334 fd32ef _free 58 API calls 10333->10334 10335 fd517b 10334->10335 10336 fd32ef _free 58 API calls 10335->10336 10337 fd5183 10336->10337 10338 fd32ef _free 58 API calls 10337->10338 10339 fd518b 10338->10339 10340 fd32ef _free 58 API calls 10339->10340 10341 fd5193 10340->10341 10342 fd32ef _free 58 API calls 10341->10342 10343 fd519b 10342->10343 10344 fd32ef _free 58 API calls 10343->10344 10345 fd51a3 10344->10345 10346 fd32ef _free 58 API calls 10345->10346 10347 fd51ae 10346->10347 10348 fd32ef _free 58 API calls 10347->10348 10349 fd51b6 10348->10349 10350 fd32ef _free 58 API calls 10349->10350 10351 fd51be 10350->10351 10352 fd32ef _free 58 API calls 10351->10352 10353 fd51c6 10352->10353 10354 fd32ef _free 58 API calls 10353->10354 10355 fd51ce 10354->10355 10356 fd32ef _free 58 API calls 10355->10356 10357 fd51d6 10356->10357 10358 fd32ef _free 58 API calls 10357->10358 10359 fd51de 10358->10359 10360 fd32ef _free 58 API calls 10359->10360 10361 fd51e6 10360->10361 10362 fd32ef _free 58 API calls 10361->10362 10363 fd51ee 10362->10363 10364 fd32ef _free 58 API calls 10363->10364 10365 fd51f6 10364->10365 10366 fd32ef _free 58 API calls 10365->10366 10367 fd51fe 10366->10367 10368 fd32ef _free 58 API calls 10367->10368 10369 fd5206 10368->10369 10370 fd32ef _free 58 API calls 10369->10370 10371 fd520e 10370->10371 10372 fd32ef _free 58 API calls 10371->10372 10373 fd5216 10372->10373 10374 fd32ef _free 58 API calls 10373->10374 10375 fd521e 10374->10375 10376 fd32ef _free 58 API calls 10375->10376 10377 fd5226 10376->10377 10378 fd32ef _free 58 API calls 10377->10378 10379 fd5234 10378->10379 10380 fd32ef _free 58 API calls 10379->10380 10381 fd523f 10380->10381 10382 fd32ef _free 58 API calls 10381->10382 10383 fd524a 10382->10383 10384 fd32ef _free 58 API calls 10383->10384 10385 fd5255 10384->10385 10386 fd32ef _free 58 API calls 10385->10386 10387 fd5260 10386->10387 10388 fd32ef _free 58 API calls 10387->10388 10389 fd526b 10388->10389 10390 fd32ef _free 58 API calls 10389->10390 10391 fd5276 10390->10391 10392 fd32ef _free 58 API calls 10391->10392 10393 fd5281 10392->10393 10394 fd32ef _free 58 API calls 10393->10394 10395 fd528c 10394->10395 10396 fd32ef _free 58 API calls 10395->10396 10397 fd5297 10396->10397 10398 fd32ef _free 58 API calls 10397->10398 10399 fd52a2 10398->10399 10400 fd32ef _free 58 API calls 10399->10400 10401 fd52ad 10400->10401 10402 fd32ef _free 58 API calls 10401->10402 10403 fd52b8 10402->10403 10404 fd32ef _free 58 API calls 10403->10404 10405 fd52c3 10404->10405 10406 fd32ef _free 58 API calls 10405->10406 10407 fd52ce 10406->10407 10408 fd32ef _free 58 API calls 10407->10408 10409 fd52d9 10408->10409 10410 fd32ef _free 58 API calls 10409->10410 10411 fd52e7 10410->10411 10412 fd32ef _free 58 API calls 10411->10412 10413 fd52f2 10412->10413 10414 fd32ef _free 58 API calls 10413->10414 10415 fd52fd 10414->10415 10416 fd32ef _free 58 API calls 10415->10416 10417 fd5308 10416->10417 10418 fd32ef _free 58 API calls 10417->10418 10419 fd5313 10418->10419 10420 fd32ef _free 58 API calls 10419->10420 10421 fd531e 10420->10421 10422 fd32ef _free 58 API calls 10421->10422 10423 fd5329 10422->10423 10424 fd32ef _free 58 API calls 10423->10424 10425 fd5334 10424->10425 10426 fd32ef _free 58 API calls 10425->10426 10427 fd533f 10426->10427 10428 fd32ef _free 58 API calls 10427->10428 10429 fd534a 10428->10429 10430 fd32ef _free 58 API calls 10429->10430 10431 fd5355 10430->10431 10432 fd32ef _free 58 API calls 10431->10432 10433 fd5360 10432->10433 10434 fd32ef _free 58 API calls 10433->10434 10435 fd536b 10434->10435 10436 fd32ef _free 58 API calls 10435->10436 10437 fd5376 10436->10437 10438 fd32ef _free 58 API calls 10437->10438 10439 fd5381 10438->10439 10440 fd32ef _free 58 API calls 10439->10440 10441 fd538c 10440->10441 10442 fd32ef _free 58 API calls 10441->10442 10443 fd539a 10442->10443 10444 fd32ef _free 58 API calls 10443->10444 10445 fd53a5 10444->10445 10446 fd32ef _free 58 API calls 10445->10446 10447 fd53b0 10446->10447 10448 fd32ef _free 58 API calls 10447->10448 10449 fd53bb 10448->10449 10450 fd32ef _free 58 API calls 10449->10450 10451 fd53c6 10450->10451 10452 fd32ef _free 58 API calls 10451->10452 10453 fd53d1 10452->10453 10454 fd32ef _free 58 API calls 10453->10454 10455 fd53dc 10454->10455 10456 fd32ef _free 58 API calls 10455->10456 10457 fd53e7 10456->10457 10458 fd32ef _free 58 API calls 10457->10458 10459 fd53f2 10458->10459 10460 fd32ef _free 58 API calls 10459->10460 10461 fd53fd 10460->10461 10462 fd32ef _free 58 API calls 10461->10462 10463 fd5408 10462->10463 10464 fd32ef _free 58 API calls 10463->10464 10465 fd5413 10464->10465 10466 fd32ef _free 58 API calls 10465->10466 10467 fd541e 10466->10467 10468 fd32ef _free 58 API calls 10467->10468 10469 fd5429 10468->10469 10470 fd32ef _free 58 API calls 10469->10470 10471 fd5434 10470->10471 10472 fd32ef _free 58 API calls 10471->10472 10473 fd543f 10472->10473 10474 fd32ef _free 58 API calls 10473->10474 10475 fd544d 10474->10475 10476 fd32ef _free 58 API calls 10475->10476 10477 fd5458 10476->10477 10478 fd32ef _free 58 API calls 10477->10478 10479 fd5463 10478->10479 10480 fd32ef _free 58 API calls 10479->10480 10481 fd546e 10480->10481 10482 fd32ef _free 58 API calls 10481->10482 10483 fd5479 10482->10483 10484 fd32ef _free 58 API calls 10483->10484 10485 fd5484 10484->10485 10486 fd32ef _free 58 API calls 10485->10486 10486->10313 10487->10240 10491 fd32da LeaveCriticalSection 10488->10491 10490 fd3b3d 10490->10227 10491->10490 10493 fd3b4b __mtinitlocknum 10492->10493 10494 fd1912 _LocaleUpdate::_LocaleUpdate 58 API calls 10493->10494 10495 fd3b53 10494->10495 10496 fd3a99 _LocaleUpdate::_LocaleUpdate 58 API calls 10495->10496 10497 fd3b5d 10496->10497 10517 fd383a 10497->10517 10500 fd336f __malloc_crt 58 API calls 10501 fd3b7f 10500->10501 10502 fd3cac __mtinitlocknum 10501->10502 10524 fd3ce7 10501->10524 10502->10185 10505 fd3cbc 10505->10502 10508 fd3ccf 10505->10508 10511 fd32ef _free 58 API calls 10505->10511 10506 fd3bb5 10507 fd3bd5 10506->10507 10510 fd32ef _free 58 API calls 10506->10510 10507->10502 10512 fd3170 __lock 58 API calls 10507->10512 10509 fd40a0 __cftof_l 58 API calls 10508->10509 10509->10502 10510->10507 10511->10508 10513 fd3c04 10512->10513 10514 fd3c92 10513->10514 10516 fd32ef _free 58 API calls 10513->10516 10534 fd3cb1 10514->10534 10516->10514 10518 fd3778 _LocaleUpdate::_LocaleUpdate 58 API calls 10517->10518 10519 fd384a 10518->10519 10520 fd3859 GetOEMCP 10519->10520 10521 fd386b 10519->10521 10522 fd3882 10520->10522 10521->10522 10523 fd3870 GetACP 10521->10523 10522->10500 10522->10502 10523->10522 10525 fd383a getSystemCP 60 API calls 10524->10525 10526 fd3d04 10525->10526 10529 fd3d55 IsValidCodePage 10526->10529 10531 fd3d0b setSBCS 10526->10531 10533 fd3d7a _memset __setmbcp_nolock 10526->10533 10527 fd13c0 __cftof_l 6 API calls 10528 fd3ba6 10527->10528 10528->10505 10528->10506 10530 fd3d67 GetCPInfo 10529->10530 10529->10531 10530->10531 10530->10533 10531->10527 10537 fd3907 GetCPInfo 10533->10537 10603 fd32da LeaveCriticalSection 10534->10603 10536 fd3cb8 10536->10502 10538 fd39e9 10537->10538 10544 fd393f 10537->10544 10541 fd13c0 __cftof_l 6 API calls 10538->10541 10543 fd3a95 10541->10543 10543->10531 10547 fd57f5 10544->10547 10546 fd5699 ___crtLCMapStringA 63 API calls 10546->10538 10548 fd3778 _LocaleUpdate::_LocaleUpdate 58 API calls 10547->10548 10549 fd5806 10548->10549 10557 fd56fd 10549->10557 10552 fd5699 10553 fd3778 _LocaleUpdate::_LocaleUpdate 58 API calls 10552->10553 10554 fd56aa 10553->10554 10574 fd5495 10554->10574 10558 fd5724 MultiByteToWideChar 10557->10558 10559 fd5717 10557->10559 10562 fd5750 10558->10562 10569 fd5749 10558->10569 10559->10558 10560 fd13c0 __cftof_l 6 API calls 10561 fd39a0 10560->10561 10561->10552 10563 fd5772 _memset __alloca_probe_16 10562->10563 10564 fd4dfb __crtLCMapStringA_stat 58 API calls 10562->10564 10565 fd57ae MultiByteToWideChar 10563->10565 10563->10569 10564->10563 10566 fd57d8 10565->10566 10567 fd57c8 GetStringTypeW 10565->10567 10570 fd56df 10566->10570 10567->10566 10569->10560 10571 fd56e9 10570->10571 10572 fd56fa 10570->10572 10571->10572 10573 fd32ef _free 58 API calls 10571->10573 10572->10569 10573->10572 10576 fd54ae MultiByteToWideChar 10574->10576 10577 fd550d 10576->10577 10581 fd5514 10576->10581 10578 fd13c0 __cftof_l 6 API calls 10577->10578 10579 fd39c1 10578->10579 10579->10546 10580 fd5573 MultiByteToWideChar 10582 fd55da 10580->10582 10583 fd558c 10580->10583 10584 fd4dfb __crtLCMapStringA_stat 58 API calls 10581->10584 10587 fd553c __alloca_probe_16 10581->10587 10586 fd56df __freea 58 API calls 10582->10586 10599 fd5982 10583->10599 10584->10587 10586->10577 10587->10577 10587->10580 10588 fd55a0 10588->10582 10589 fd55b6 10588->10589 10591 fd55e2 10588->10591 10589->10582 10590 fd5982 __crtLCMapStringA_stat 2 API calls 10589->10590 10590->10582 10594 fd4dfb __crtLCMapStringA_stat 58 API calls 10591->10594 10597 fd560a __alloca_probe_16 10591->10597 10592 fd5982 __crtLCMapStringA_stat 2 API calls 10593 fd564d 10592->10593 10595 fd5675 10593->10595 10598 fd5667 WideCharToMultiByte 10593->10598 10594->10597 10596 fd56df __freea 58 API calls 10595->10596 10596->10582 10597->10582 10597->10592 10598->10595 10600 fd59ad __crtLCMapStringA_stat 10599->10600 10601 fd5992 LCMapStringEx 10599->10601 10602 fd59c4 LCMapStringW 10600->10602 10601->10588 10602->10588 10603->10536 10605 fd495b 10604->10605 10606 fd494d 10604->10606 10607 fd40a0 __cftof_l 58 API calls 10605->10607 10606->10605 10611 fd4971 10606->10611 10608 fd4962 10607->10608 10609 fd4031 __cftof_l 9 API calls 10608->10609 10610 fd496c 10609->10610 10610->9850 10611->10610 10612 fd40a0 __cftof_l 58 API calls 10611->10612 10612->10608 10614 fd4384 EncodePointer 10613->10614 10614->10614 10615 fd439e 10614->10615 10615->9857 10619 fd4270 10616->10619 10618 fd4377 10618->9859 10620 fd427c __mtinitlocknum 10619->10620 10627 fd1c8b 10620->10627 10626 fd42a3 __mtinitlocknum 10626->10618 10628 fd3170 __lock 58 API calls 10627->10628 10629 fd1c92 10628->10629 10630 fd42b4 DecodePointer DecodePointer 10629->10630 10631 fd42e1 10630->10631 10632 fd4291 10630->10632 10631->10632 10644 fd58d0 10631->10644 10641 fd42ae 10632->10641 10634 fd42f3 10635 fd4344 EncodePointer EncodePointer 10634->10635 10636 fd4318 10634->10636 10651 fd33b6 10634->10651 10635->10632 10636->10632 10638 fd33b6 __realloc_crt 61 API calls 10636->10638 10639 fd4332 EncodePointer 10636->10639 10640 fd432c 10638->10640 10639->10635 10640->10632 10640->10639 10678 fd1c94 10641->10678 10645 fd58ee HeapSize 10644->10645 10646 fd58d9 10644->10646 10645->10634 10647 fd40a0 __cftof_l 58 API calls 10646->10647 10648 fd58de 10647->10648 10649 fd4031 __cftof_l 9 API calls 10648->10649 10650 fd58e9 10649->10650 10650->10634 10654 fd33bd 10651->10654 10653 fd33fa 10653->10636 10654->10653 10656 fd4e8d 10654->10656 10677 fd3137 Sleep 10654->10677 10657 fd4e96 10656->10657 10658 fd4ea1 10656->10658 10659 fd4dfb __crtLCMapStringA_stat 58 API calls 10657->10659 10660 fd4ea9 10658->10660 10668 fd4eb6 10658->10668 10661 fd4e9e 10659->10661 10662 fd32ef _free 58 API calls 10660->10662 10661->10654 10676 fd4eb1 _free 10662->10676 10663 fd4eee 10665 fd43a0 __calloc_impl DecodePointer 10663->10665 10664 fd4ebe HeapReAlloc 10664->10668 10664->10676 10666 fd4ef4 10665->10666 10669 fd40a0 __cftof_l 58 API calls 10666->10669 10667 fd4f1e 10671 fd40a0 __cftof_l 58 API calls 10667->10671 10668->10663 10668->10664 10668->10667 10670 fd43a0 __calloc_impl DecodePointer 10668->10670 10673 fd4f06 10668->10673 10669->10676 10670->10668 10672 fd4f23 GetLastError 10671->10672 10672->10676 10674 fd40a0 __cftof_l 58 API calls 10673->10674 10675 fd4f0b GetLastError 10674->10675 10675->10676 10676->10654 10677->10654 10681 fd32da LeaveCriticalSection 10678->10681 10680 fd1c9b 10680->10626 10681->10680 10683 fd111f 10682->10683 10684 fd1186 10683->10684 10685 fd1136 VirtualProtect 10683->10685 10702 fdb4e8 10684->10702 10685->10684 10686 fd1156 10685->10686 10692 fe75c0 10686->10692 10688 fd11a7 10688->9863 10688->9866 10693 fe75e2 10692->10693 10694 fe760e GetPEB 10693->10694 10695 fe7628 10694->10695 10696 fe77c5 VirtualAlloc 10694->10696 10695->10696 10698 fe77ec 10696->10698 10697 fe7857 LoadLibraryA 10697->10698 10698->10697 10700 fe78c6 10698->10700 10705 434dd0 10700->10705 10703 fd13c0 __cftof_l 6 API calls 10702->10703 10704 fdb4f2 10703->10704 10704->10704 10706 434de9 VirtualProtect 10705->10706 10707 434ded CreateThread 10705->10707 10706->10684 10707->10706 10708 434e0b CloseHandle 10707->10708 10709 434b30 Sleep 10707->10709 10708->10706 10754 4347e0 10709->10754 10712 434b52 CreateThread 10714 434b70 WaitForSingleObject 10712->10714 10715 434b9c 10712->10715 11402 432d30 10712->11402 10713 434b4a ExitProcess 10716 434b92 CloseHandle 10714->10716 10717 434b86 TerminateThread 10714->10717 10770 4348d0 CreateToolhelp32Snapshot VirtualAlloc 10715->10770 10716->10715 10717->10716 10719 434ba1 10781 4342c0 10719->10781 10723 434bae 10724 434c4b 10723->10724 10725 434bfc VirtualAlloc 10723->10725 10728 434c85 10724->10728 10732 434c6f Sleep 10724->10732 10815 4358d0 10724->10815 10726 434c43 ExitProcess 10725->10726 10727 434c19 GetModuleFileNameW 10725->10727 10804 433dc0 10727->10804 10733 434cf8 10728->10733 10734 434caf lstrlenA VirtualAlloc CryptStringToBinaryA 10728->10734 10732->10724 10868 434210 10733->10868 10734->10733 10735 434cf0 ExitProcess 10734->10735 10737 434d04 InitializeCriticalSection 10738 434d22 10737->10738 10739 434d15 10737->10739 10877 434000 VirtualAlloc GetTickCount 10738->10877 10871 4341e0 10739->10871 10742 434d2a DeleteCriticalSection 10885 433c80 AllocateAndInitializeSid 10742->10885 10745 434d3a 10746 434d43 VirtualAlloc 10745->10746 10889 4345c0 10745->10889 10748 434d60 GetModuleFileNameW 10746->10748 10749 434d8a 10746->10749 10750 433dc0 17 API calls 10748->10750 10751 434d93 ShellExecuteW 10749->10751 10752 434dad ExitThread 10749->10752 10753 434d79 VirtualFree 10750->10753 10751->10752 10753->10749 10896 433bd0 GetProcessHeap 10754->10896 10756 434817 10897 437600 10756->10897 10760 434829 VirtualAlloc 10761 434848 lstrcpyW lstrlenW 10760->10761 10983 437210 10761->10983 10764 434879 CreateMutexW GetLastError 10765 434891 GetLastError 10764->10765 10766 43489a VirtualFree 10764->10766 10765->10766 11009 437ee0 10766->11009 10771 434a68 10770->10771 10776 434a7b 10770->10776 10772 434a73 Process32FirstW 10771->10772 10771->10776 10772->10776 10773 434a90 lstrcmpiW 10774 434a9f OpenProcess 10773->10774 10773->10776 10775 434ab1 TerminateProcess CloseHandle 10774->10775 10774->10776 10775->10776 10776->10773 10777 434ad4 Process32NextW 10776->10777 10777->10776 10778 434ae7 10777->10778 10779 434aeb VirtualFree 10778->10779 10780 434af9 CloseHandle 10778->10780 10779->10780 10780->10719 10782 4342db 10781->10782 10783 4345a8 10781->10783 11081 433bd0 GetProcessHeap 10782->11081 10801 436660 VirtualAlloc VirtualAlloc 10783->10801 10785 434306 10786 437600 98 API calls 10785->10786 10787 434312 10786->10787 10788 437410 16 API calls 10787->10788 10789 43431e VirtualAlloc 10788->10789 10790 434342 10789->10790 10791 437210 49 API calls 10790->10791 10792 434360 10791->10792 10793 43436c lstrlenW 10792->10793 10794 4343a0 10793->10794 10795 434466 10794->10795 10798 4343f0 lstrcpyW lstrlenW 10794->10798 10796 434557 VirtualAlloc 10795->10796 10797 434588 VirtualFree 10795->10797 10796->10797 10799 434574 wsprintfW 10796->10799 10800 437ee0 10 API calls 10797->10800 10798->10794 10798->10795 10799->10797 10800->10783 11082 4364f0 CryptAcquireContextW 10801->11082 11090 433d00 10804->11090 10806 433dd6 10807 433fda VirtualFree 10806->10807 10808 433c80 4 API calls 10806->10808 10807->10726 10809 433de3 10808->10809 10809->10807 10810 433deb ExpandEnvironmentStringsW wsprintfW VirtualAlloc GetForegroundWindow 10809->10810 10811 433fc0 ShellExecuteExW 10810->10811 10812 433fe1 WaitForSingleObject CloseHandle ExitProcess 10811->10812 10813 433fc7 10811->10813 10813->10811 10814 433fcd VirtualFree 10813->10814 10814->10807 11095 438130 GetTickCount 10815->11095 10819 435939 10820 437600 98 API calls 10819->10820 10821 435942 10820->10821 10822 437410 16 API calls 10821->10822 10823 43594b VirtualAlloc 10822->10823 10824 43598f 10823->10824 10825 435e8b 10824->10825 10826 4359fd 6 API calls 10824->10826 10829 435ea0 10825->10829 10830 435e96 VirtualFree 10825->10830 10827 435a7e lstrlenA 10826->10827 10831 435aa5 lstrlenA 10827->10831 10832 435ea5 VirtualFree 10829->10832 10830->10829 10835 435af2 lstrlenA 10831->10835 10841 435ac3 lstrlenA 10831->10841 10834 437ee0 10 API calls 10832->10834 10836 435ebc 10834->10836 10837 435b21 lstrcatW lstrlenW 10835->10837 10844 435afb lstrlenA 10835->10844 10836->10724 10838 437210 49 API calls 10837->10838 10840 435b4b 10838->10840 11107 4335c0 VirtualAlloc 10840->11107 10842 435aee 10841->10842 10842->10835 10844->10837 10846 435b68 18 API calls 10848 435cca lstrlenW 10846->10848 10850 435cfb lstrlenW VirtualAlloc 10848->10850 10851 435ced VirtualFree 10848->10851 10852 435d30 10850->10852 10853 435d1d wsprintfA 10850->10853 10851->10850 11118 436010 VirtualAlloc 10852->11118 10853->10852 10856 435d71 lstrlenA VirtualAlloc lstrlenA 10858 435d99 lstrlenA 10856->10858 10857 435d6b GetLastError 10857->10856 10860 435dde lstrlenA MultiByteToWideChar 10858->10860 10866 435db2 lstrlenA 10858->10866 11127 435520 10860->11127 10864 435e1b VirtualFree VirtualFree VirtualFree 10864->10832 10865 435e4d VirtualFree VirtualFree VirtualFree 10865->10825 10866->10860 10869 43421d VirtualAlloc 10868->10869 10870 434238 10868->10870 10869->10870 10870->10737 10870->10870 10872 4341f4 10871->10872 10873 434000 417 API calls 10872->10873 10874 4341fc 10873->10874 11248 436730 VirtualFree VirtualFree 10874->11248 10876 434204 10876->10742 10878 434060 GetDriveTypeW 10877->10878 10879 434075 10878->10879 10879->10878 10880 43407a CreateThread 10879->10880 10881 4340be WaitForMultipleObjects GetTickCount 10879->10881 10880->10879 11283 4370b0 VirtualAlloc wsprintfW InitializeCriticalSection VirtualAlloc 10880->11283 10882 43411f 10881->10882 11249 4356a0 10882->11249 10884 4341cd 10884->10742 10886 433cba 10885->10886 10887 433cbe GetModuleHandleA GetProcAddress 10885->10887 10886->10745 10888 433ce0 FreeSid 10887->10888 10888->10745 10890 433d00 4 API calls 10889->10890 10891 4345d4 VirtualAlloc 10890->10891 10893 43478b 10891->10893 10894 43478f GetSystemDirectoryW lstrcatW ShellExecuteW 10891->10894 10895 4347bf VirtualFree 10893->10895 10894->10895 10895->10746 10896->10756 10898 437619 VirtualAlloc GetUserNameW 10897->10898 10899 43763e 10897->10899 10898->10899 10900 437666 10899->10900 10901 437644 VirtualAlloc GetComputerNameW 10899->10901 10902 437672 VirtualAlloc 10900->10902 10903 4376c6 10900->10903 10901->10900 10902->10903 10906 437689 10902->10906 10904 4376d0 VirtualAlloc RegOpenKeyExW 10903->10904 10905 437765 10903->10905 10907 43774e VirtualFree 10904->10907 10908 43770c RegQueryValueExW 10904->10908 10909 437869 10905->10909 10910 43776f VirtualAlloc VirtualAlloc 10905->10910 11030 437580 RegOpenKeyExW 10906->11030 10907->10905 10913 437730 10908->10913 10914 437739 GetLastError 10908->10914 10915 4378cb 10909->10915 10916 43786f VirtualAlloc 10909->10916 10917 4377a4 wsprintfW RegOpenKeyExW 10910->10917 10912 4376a4 10912->10903 10927 4376c1 wsprintfW 10912->10927 10920 43773f RegCloseKey 10913->10920 10914->10920 10918 4378d1 GetNativeSystemInfo VirtualAlloc 10915->10918 10919 43793e 10915->10919 10921 437580 5 API calls 10916->10921 10922 4377fb 10917->10922 10923 4377d9 RegQueryValueExW 10917->10923 10925 437917 wsprintfW 10918->10925 10926 4378f4 10918->10926 10928 437944 10919->10928 10929 43795f 10919->10929 10920->10905 10920->10907 10930 43789d 10921->10930 10922->10917 10933 43780a RegCloseKey 10922->10933 10935 437846 wsprintfW VirtualFree 10922->10935 10923->10922 10924 437804 GetLastError 10923->10924 10924->10933 10925->10919 10926->10925 10934 437902 wsprintfW ExitProcess 10926->10934 10927->10903 11035 437ce0 VirtualAlloc VirtualAlloc 10928->11035 10931 437aa9 10929->10931 10932 437969 VirtualAlloc VirtualAlloc GetWindowsDirectoryW GetVolumeInformationW 10929->10932 10930->10915 10940 437580 5 API calls 10930->10940 10943 437c62 10931->10943 10944 437ab9 VirtualAlloc 10931->10944 10938 437580 5 API calls 10932->10938 10933->10922 10939 437819 lstrcmpiW 10933->10939 10935->10909 10942 4379f5 10938->10942 10939->10922 10939->10934 10945 4378be wsprintfW 10940->10945 10941 437958 10941->10929 10946 437a2a wsprintfW lstrcatW GetModuleHandleW GetProcAddress 10942->10946 10947 4379f9 lstrlenW 10942->10947 10948 434820 10943->10948 10949 437c6b VirtualAlloc 10943->10949 10959 437b10 10944->10959 10945->10915 10951 437a84 VirtualFree 10946->10951 10952 437a6d lstrlenW 10946->10952 10950 437580 5 API calls 10947->10950 10965 437410 10948->10965 10953 437ca6 10949->10953 10954 437c89 10949->10954 10950->10946 10951->10931 10952->10951 10953->10948 11053 437160 10954->11053 10956 437b32 GetDriveTypeW 10956->10959 10959->10956 10961 437b59 lstrcatW lstrcatW lstrcatW GetDiskFreeSpaceW 10959->10961 10963 437c53 lstrlenW 10959->10963 10964 437bcc lstrlenW wsprintfW lstrlenW wsprintfW lstrcatW 10959->10964 10960 437c94 VirtualFree 10960->10953 10961->10959 10962 437c33 lstrcatW 10961->10962 10962->10959 10963->10943 10964->10959 10966 437420 10965->10966 10967 43747a 10966->10967 10968 43745f lstrlenW lstrlenW 10966->10968 10969 437480 lstrlenW lstrlenW 10967->10969 10970 43749b 10967->10970 10968->10967 10969->10970 10971 4374a1 lstrlenW lstrlenW 10970->10971 10972 4374bc 10970->10972 10971->10972 10973 4374c2 lstrlenW lstrlenW 10972->10973 10974 4374dd 10972->10974 10973->10974 10975 4374e3 lstrlenW lstrlenW 10974->10975 10976 4374fe 10974->10976 10975->10976 10977 437504 lstrlenW lstrlenW 10976->10977 10978 43751f 10976->10978 10977->10978 10979 437549 10978->10979 10980 43752e lstrlenW lstrlenW 10978->10980 10981 437552 lstrlenW lstrlenW 10979->10981 10982 437577 10979->10982 10980->10979 10981->10760 10982->10760 10984 43722a lstrcatW lstrcatW lstrcatW lstrcatW 10983->10984 10985 43724c 10983->10985 10984->10985 10986 437251 lstrcatW lstrcatW lstrcatW lstrcatW 10985->10986 10987 43726d 10985->10987 10986->10987 10988 437273 lstrcatW lstrcatW lstrcatW lstrcatW 10987->10988 10989 43728f 10987->10989 10988->10989 10990 4372b1 10989->10990 10991 437295 lstrcatW lstrcatW lstrcatW lstrcatW 10989->10991 10992 4372d3 10990->10992 10993 4372b7 lstrcatW lstrcatW lstrcatW lstrcatW 10990->10993 10991->10990 10994 4372f5 10992->10994 10995 4372d9 lstrcatW lstrcatW lstrcatW lstrcatW 10992->10995 10993->10992 10996 437317 10994->10996 10997 4372fb lstrcatW lstrcatW lstrcatW lstrcatW 10994->10997 10995->10994 10998 437339 10996->10998 10999 43731d lstrcatW lstrcatW lstrcatW lstrcatW 10996->10999 10997->10996 11000 43735b 10998->11000 11001 43733f lstrcatW lstrcatW lstrcatW lstrcatW 10998->11001 10999->10998 11002 437361 VirtualAlloc 11000->11002 11003 4373cc 11000->11003 11001->11000 11006 437391 wsprintfW 11002->11006 11007 43737c wsprintfW 11002->11007 11004 4373d2 lstrcatW lstrcatW lstrcatW lstrcatW 11003->11004 11005 4373ee lstrlenW 11003->11005 11004->11005 11005->10764 11008 4373a0 lstrcatW lstrcatW lstrcatW lstrcatW VirtualFree 11006->11008 11007->11008 11008->11003 11010 437efb 11009->11010 11011 437eef VirtualFree 11009->11011 11012 437f01 VirtualFree 11010->11012 11013 437f0d 11010->11013 11011->11010 11012->11013 11014 437f13 VirtualFree 11013->11014 11015 437f1f 11013->11015 11014->11015 11016 437f31 11015->11016 11017 437f25 VirtualFree 11015->11017 11018 437f43 11016->11018 11019 437f37 VirtualFree 11016->11019 11017->11016 11020 437f55 11018->11020 11021 437f49 VirtualFree 11018->11021 11019->11018 11022 437f67 11020->11022 11023 437f5b VirtualFree 11020->11023 11021->11020 11024 437f79 11022->11024 11025 437f6d VirtualFree 11022->11025 11023->11022 11026 437f8b 11024->11026 11027 437f7f VirtualFree 11024->11027 11025->11024 11028 4348ba 11026->11028 11029 437f94 VirtualFree 11026->11029 11027->11026 11028->10712 11028->10713 11029->11028 11031 4375a2 RegQueryValueExW 11030->11031 11032 4375ee 11030->11032 11033 4375c1 RegCloseKey 11031->11033 11034 4375d6 GetLastError RegCloseKey 11031->11034 11032->10912 11033->10912 11034->10912 11036 437da2 11035->11036 11037 437d7c CreateToolhelp32Snapshot 11035->11037 11036->10941 11038 437d94 VirtualFree 11037->11038 11039 437dad Process32FirstW 11037->11039 11038->11036 11040 437e9d VirtualFree CloseHandle 11039->11040 11041 437dcd 11039->11041 11042 437ec7 11040->11042 11043 437ebd VirtualFree 11040->11043 11044 437e77 11041->11044 11046 437de0 lstrcmpiW 11041->11046 11048 437e0a lstrcpyW lstrcatW 11041->11048 11049 437e1f lstrcatW lstrcatW 11041->11049 11050 437e57 Process32NextW 11041->11050 11042->10941 11043->11042 11045 437e95 11044->11045 11047 437e85 lstrlenW 11044->11047 11045->11040 11046->11041 11047->11045 11051 437e30 lstrlenW 11048->11051 11049->11051 11050->11044 11052 437e68 GetLastError 11050->11052 11051->11050 11052->11041 11052->11044 11063 4382c0 InternetOpenW 11053->11063 11057 4371b6 11058 4371e1 VirtualFree 11057->11058 11059 4371ba lstrlenA 11057->11059 11060 4371f6 InternetCloseHandle 11058->11060 11061 4371fd 11058->11061 11059->11058 11062 4371ca wsprintfW 11059->11062 11060->11061 11061->10948 11061->10960 11062->11058 11064 437172 VirtualAlloc lstrlenW 11063->11064 11065 4384ad InternetOpenW 11063->11065 11066 4384d0 11064->11066 11065->11064 11067 4384e2 InternetCloseHandle 11066->11067 11068 4384e9 11066->11068 11067->11068 11069 4382c0 2 API calls 11068->11069 11070 4384f0 InternetConnectW 11069->11070 11071 438521 VirtualAlloc wsprintfW HttpOpenRequestW 11070->11071 11072 438518 11070->11072 11073 438571 HttpAddRequestHeadersW 11071->11073 11074 438637 InternetCloseHandle InternetCloseHandle VirtualFree 11071->11074 11072->11057 11073->11074 11075 4385cf HttpSendRequestW 11073->11075 11074->11057 11076 438631 GetLastError 11075->11076 11077 4385e6 InternetReadFile 11075->11077 11076->11074 11077->11074 11078 438605 11077->11078 11078->11074 11079 43860c InternetReadFile 11078->11079 11079->11078 11080 43862f 11079->11080 11080->11074 11081->10785 11083 436512 GetLastError 11082->11083 11084 436548 CryptGenKey 11082->11084 11085 43651f CryptAcquireContextW 11083->11085 11088 436538 11083->11088 11086 436565 CryptExportKey CryptExportKey CryptDestroyKey CryptReleaseContext CryptAcquireContextW 11084->11086 11087 436564 11084->11087 11085->11088 11089 43653f 11085->11089 11086->11088 11087->11086 11088->10723 11089->11084 11093 4395f0 11090->11093 11094 433d57 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 11093->11094 11094->10806 11141 437fb0 VirtualAlloc 11095->11141 11098 4358f6 11106 433bd0 GetProcessHeap 11098->11106 11099 4381cb lstrcatW 11099->11098 11105 4381e0 11099->11105 11100 437fb0 2 API calls 11101 438228 lstrcatW VirtualFree 11100->11101 11102 437fb0 2 API calls 11101->11102 11103 438278 lstrcatW lstrcatW VirtualFree 11102->11103 11104 4382a1 lstrcatW 11103->11104 11103->11105 11104->11105 11105->11098 11105->11100 11106->10819 11108 4335f1 11107->11108 11109 4335f7 GetModuleFileNameW CreateFileW 11107->11109 11108->10846 11110 433623 GetFileSize VirtualAlloc 11109->11110 11111 43369a VirtualFree 11109->11111 11112 433693 CloseHandle 11110->11112 11113 433641 ReadFile 11110->11113 11111->10846 11112->11111 11114 433656 11113->11114 11115 433685 VirtualFree 11113->11115 11114->11115 11145 4334f0 lstrlenA VirtualAlloc 11114->11145 11115->11112 11119 436043 GetModuleHandleA 11118->11119 11120 435d42 CryptBinaryToStringA 11118->11120 11121 436052 GetProcAddress lstrlenA 11119->11121 11122 436086 _memset 11119->11122 11120->10856 11120->10857 11123 436075 wsprintfA 11121->11123 11124 4360a0 lstrlenA 11122->11124 11123->11122 11125 4360b8 11124->11125 11126 4360c8 VirtualFree 11125->11126 11126->11120 11128 4382c0 2 API calls 11127->11128 11129 435539 11128->11129 11152 435250 VirtualAlloc 11129->11152 11132 43557d lstrcatA lstrlenA lstrlenW lstrlenA 11134 4384d0 15 API calls 11132->11134 11136 435622 11134->11136 11135 435657 VirtualFree VirtualFree VirtualFree 11137 435684 InternetCloseHandle 11135->11137 11138 43568b 11135->11138 11136->11135 11161 435400 lstrlenA VirtualAlloc 11136->11161 11137->11138 11138->10864 11138->10865 11140 435643 11140->11135 11142 438127 lstrlenW VirtualAlloc lstrcatW VirtualFree 11141->11142 11143 4380aa 11141->11143 11142->11098 11142->11099 11143->11142 11144 438114 lstrcatW 11143->11144 11144->11142 11144->11143 11146 433528 CryptStringToBinaryA 11145->11146 11147 4335af 11145->11147 11148 4335a1 VirtualFree 11146->11148 11149 43353f VirtualAlloc VirtualAlloc 11146->11149 11147->11115 11148->11147 11150 433576 wsprintfW wsprintfW 11149->11150 11151 43356f 11149->11151 11150->11148 11151->11150 11153 4352c0 11152->11153 11154 43536c lstrlenA VirtualAlloc VirtualAlloc 11152->11154 11155 4352f6 lstrlenW VirtualAlloc 11153->11155 11156 4352eb Sleep 11153->11156 11154->11132 11195 435070 CreatePipe 11155->11195 11156->11155 11158 435321 lstrcmpiA 11159 435334 VirtualFree 11158->11159 11160 435349 wsprintfW VirtualFree 11158->11160 11159->11153 11160->11154 11162 435433 CryptStringToBinaryA 11161->11162 11164 435459 11162->11164 11165 43550c GetLastError 11162->11165 11167 436010 7 API calls 11164->11167 11166 4354f3 VirtualFree 11165->11166 11166->11140 11168 435463 11167->11168 11217 4333e0 11168->11217 11171 435514 11227 435380 VirtualAlloc VirtualAlloc 11171->11227 11172 43547d 11174 4354c8 11172->11174 11175 43549f lstrlenA VirtualAlloc 11172->11175 11178 4354e4 11174->11178 11181 4354dc HeapFree 11174->11181 11175->11174 11177 4354c0 lstrcpyA 11175->11177 11177->11174 11179 4354f0 11178->11179 11183 4354ed HeapFree 11178->11183 11179->11166 11181->11178 11183->11179 11196 4351a1 SetHandleInformation 11195->11196 11197 435197 11195->11197 11196->11197 11198 4351b7 CreatePipe SetHandleInformation 11196->11198 11197->11158 11198->11197 11199 4351e0 VirtualAlloc 11198->11199 11200 4351fa wsprintfW 11199->11200 11201 43522f lstrcpyA 11199->11201 11206 434e20 11200->11206 11201->11158 11203 43520f 11211 434fc0 11203->11211 11207 4395f0 _memset 11206->11207 11208 434e3e CreateProcessW 11207->11208 11209 434e94 CloseHandle CloseHandle 11208->11209 11210 434e89 GetLastError 11208->11210 11209->11203 11210->11203 11212 434fcd 11211->11212 11213 434fd6 ReadFile 11212->11213 11214 435045 11212->11214 11213->11212 11213->11214 11215 434eb0 lstrcpyA lstrlenA lstrcpyA 11214->11215 11216 435063 VirtualFree 11214->11216 11215->11216 11216->11158 11231 4332b0 lstrlenA 11217->11231 11220 4334d9 ExitProcess 11221 433407 11222 433412 11221->11222 11225 433483 lstrlenA GetProcessHeap HeapAlloc 11221->11225 11235 433190 11221->11235 11239 433200 11221->11239 11222->11171 11222->11172 11225->11221 11226 4334a5 lstrcpyA 11225->11226 11226->11221 11228 4353b0 GetModuleFileNameW 11227->11228 11229 4353e9 ExitProcess 11227->11229 11228->11229 11230 4353c2 wsprintfW ShellExecuteW 11228->11230 11230->11229 11232 4332f8 11231->11232 11233 4332cf 11231->11233 11232->11220 11232->11221 11234 4332d0 lstrlenA 11233->11234 11234->11232 11234->11234 11236 4331b0 lstrcmpiA lstrcmpiA 11235->11236 11238 43319e 11235->11238 11236->11221 11237 4331f1 11237->11221 11238->11236 11238->11237 11246 433210 11239->11246 11240 43323d 11240->11221 11241 433250 lstrlenA GetProcessHeap HeapAlloc 11243 43328d 11241->11243 11242 43326d 11244 433272 lstrlenA GetProcessHeap HeapAlloc 11242->11244 11245 433299 11242->11245 11243->11245 11247 433291 lstrcpyA 11243->11247 11244->11243 11245->11221 11246->11240 11246->11241 11246->11242 11247->11245 11248->10876 11250 438130 14 API calls 11249->11250 11251 4356be VirtualAlloc 11250->11251 11253 4356f1 wsprintfW 11251->11253 11282 433bd0 GetProcessHeap 11253->11282 11256 435746 11257 437600 98 API calls 11256->11257 11258 435751 11257->11258 11259 437410 16 API calls 11258->11259 11260 43575c lstrlenW 11259->11260 11261 437210 49 API calls 11260->11261 11262 435772 lstrlenW 11261->11262 11263 435796 lstrlenW VirtualAlloc 11262->11263 11264 435788 VirtualFree 11262->11264 11265 4357c5 11263->11265 11266 4357b5 wsprintfA 11263->11266 11264->11263 11267 436010 7 API calls 11265->11267 11266->11265 11268 4357d5 CryptBinaryToStringA 11267->11268 11269 435800 lstrlenA VirtualAlloc lstrlenA 11268->11269 11270 4357fa GetLastError 11268->11270 11271 43582f lstrlenA 11269->11271 11270->11269 11273 43586a 11271->11273 11279 43584b lstrlenA 11271->11279 11274 435520 100 API calls 11273->11274 11275 43587a 11274->11275 11277 4358a2 VirtualFree 11275->11277 11278 435898 VirtualFree 11275->11278 11280 437ee0 10 API calls 11277->11280 11278->11277 11279->11273 11281 4358b9 VirtualFree 11280->11281 11281->10884 11282->11256 11286 436f00 11283->11286 11285 437142 VirtualFree ExitThread 11287 436f30 11286->11287 11288 436f1e 11286->11288 11295 436f34 11287->11295 11334 436e50 VirtualAlloc wsprintfW CreateFileW 11287->11334 11308 4368a0 VirtualAlloc 11288->11308 11291 436f26 11291->11287 11319 436cb0 lstrlenW lstrcatW FindFirstFileW 11291->11319 11292 436f5f lstrlenW lstrcatW FindFirstFileW 11293 436fa1 11292->11293 11294 436f95 11292->11294 11296 436fa4 lstrcmpW 11293->11296 11294->11285 11295->11285 11298 437083 FindNextFileW 11296->11298 11299 436fbe lstrcmpW 11296->11299 11298->11296 11301 43709b FindClose 11298->11301 11299->11298 11300 436fd8 lstrcatW 11299->11300 11305 436feb 11300->11305 11301->11285 11303 437021 lstrcatW 11304 436f00 104 API calls 11303->11304 11304->11305 11305->11298 11305->11303 11306 437001 lstrcatW 11305->11306 11340 436bc0 VirtualAlloc wsprintfW 11305->11340 11307 436f00 104 API calls 11306->11307 11307->11305 11310 4368d0 11308->11310 11309 43690c VirtualFree 11309->11291 11311 436973 SHGetSpecialFolderPathW 11310->11311 11318 436904 11310->11318 11312 436984 11311->11312 11313 43699f SHGetSpecialFolderPathW 11311->11313 11312->11313 11312->11318 11314 4369bd SHGetSpecialFolderPathW 11313->11314 11315 4369ac 11313->11315 11316 4369db SHGetSpecialFolderPathW 11314->11316 11317 4369ca 11314->11317 11315->11314 11315->11318 11316->11318 11317->11316 11317->11318 11318->11309 11320 436d00 lstrcmpW 11319->11320 11321 436e22 FindNextFileW 11320->11321 11322 436d16 lstrcmpW 11320->11322 11321->11320 11323 436e3a FindClose 11321->11323 11322->11321 11324 436d2c lstrcatW lstrlenW 11322->11324 11323->11287 11325 436d4f 11324->11325 11325->11321 11326 436d64 lstrcmpW 11325->11326 11328 436e02 CloseHandle 11325->11328 11331 436df1 VirtualFree 11325->11331 11332 436dd9 lstrlenA 11325->11332 11326->11325 11327 436d74 CreateFileW GetFileSize 11326->11327 11327->11328 11329 436da1 VirtualAlloc 11327->11329 11328->11323 11328->11325 11329->11325 11330 436db6 ReadFile 11329->11330 11330->11325 11330->11331 11331->11325 11348 436c50 lstrlenA 11332->11348 11335 436eae 11334->11335 11336 436e9c GetLastError 11334->11336 11338 436eb7 lstrlenW WriteFile 11335->11338 11339 436ed4 CloseHandle 11335->11339 11337 436ee0 VirtualFree 11336->11337 11337->11292 11338->11339 11339->11337 11350 436ad0 11340->11350 11342 436bfa 11345 436c17 VirtualFree 11342->11345 11358 436a10 lstrlenW lstrlenW 11342->11358 11345->11305 11346 436c13 11346->11345 11370 4337b0 GetFileAttributesW SetFileAttributesW 11346->11370 11349 436c6a 11348->11349 11349->11325 11351 436ae0 11350->11351 11352 436aea lstrlenW 11350->11352 11351->11342 11353 436b10 11352->11353 11354 436afe 11352->11354 11353->11342 11354->11353 11355 436b18 lstrlenW VirtualAlloc wsprintfW 11354->11355 11357 436b55 VirtualFree 11355->11357 11357->11342 11359 436a3e lstrcmpiW 11358->11359 11363 436a2c 11358->11363 11360 436a53 11359->11360 11361 436a5c lstrcmpiW 11359->11361 11360->11346 11361->11360 11362 436a68 lstrcmpiW 11361->11362 11362->11360 11364 436a74 lstrcmpiW 11362->11364 11363->11359 11364->11360 11365 436a80 lstrcmpiW 11364->11365 11365->11360 11366 436a8c lstrcmpiW 11365->11366 11366->11360 11367 436a98 lstrcmpiW 11366->11367 11367->11360 11368 436aa4 lstrcmpiW 11367->11368 11368->11360 11369 436ab0 lstrcmpiW 11368->11369 11369->11346 11371 436610 11370->11371 11372 4337f6 VirtualAlloc lstrcpyW lstrcatW 11371->11372 11373 438880 9 API calls 11372->11373 11374 433875 11373->11374 11375 438880 9 API calls 11374->11375 11376 433885 VirtualAlloc VirtualAlloc 11375->11376 11377 436770 12 API calls 11376->11377 11378 4338f4 11377->11378 11379 433901 MessageBoxA 11378->11379 11380 433917 11378->11380 11381 433985 VirtualFree VirtualFree 11379->11381 11382 436770 12 API calls 11380->11382 11384 433bae VirtualFree 11381->11384 11383 43392c 11382->11383 11385 433933 GetLastError 11383->11385 11386 43394c 11383->11386 11384->11345 11385->11384 11387 43395f CreateFileW 11386->11387 11387->11381 11388 4339ae VirtualAlloc VirtualAlloc 11387->11388 11389 4339f3 ReadFile 11388->11389 11390 433b19 VirtualFree 11389->11390 11401 4339f0 _memmove 11389->11401 11391 433b68 CloseHandle VirtualFree VirtualFree VirtualFree 11390->11391 11392 433b2e WriteFile WriteFile WriteFile 11390->11392 11394 433bab 11391->11394 11395 433b9f MoveFileW 11391->11395 11392->11391 11393 433a58 VirtualAlloc 11393->11401 11394->11384 11395->11394 11396 433a77 VirtualAlloc 11397 433ab2 VirtualFree SetFilePointerEx 11396->11397 11396->11401 11398 433ae4 WriteFile 11397->11398 11399 433ade GetLastError 11397->11399 11400 433b05 VirtualFree 11398->11400 11398->11401 11399->11398 11400->11390 11400->11401 11401->11389 11401->11390 11401->11393 11401->11396 11401->11397 11401->11400 11423 432f50 EnumDeviceDrivers 11402->11423 11404 432d8c 11405 432de9 GetModuleHandleW LoadCursorW LoadIconW RegisterClassExW 11404->11405 11406 432f50 7 API calls 11404->11406 11407 432e75 ExitThread 11405->11407 11408 432e7b GetModuleHandleW GetModuleHandleW CreateWindowExW SetWindowLongW 11405->11408 11409 432d99 11406->11409 11410 432ec5 ShowWindow UpdateWindow CreateThread 11408->11410 11411 432ebe ExitThread 11408->11411 11409->11405 11416 432f50 7 API calls 11409->11416 11412 432ef4 GetMessageW 11410->11412 11413 432eed CloseHandle 11410->11413 11512 432d10 SendMessageW ExitThread 11410->11512 11414 432f0b 11412->11414 11415 432f3d ExitThread 11412->11415 11413->11412 11417 432f17 TranslateMessage DispatchMessageW 11414->11417 11419 432dce 11416->11419 11417->11415 11418 432f2c GetMessageW 11417->11418 11418->11415 11418->11417 11419->11415 11433 4330a0 11419->11433 11424 432f82 VirtualAlloc 11423->11424 11425 432f7d 11423->11425 11426 432f99 11424->11426 11427 432f9f EnumDeviceDrivers 11424->11427 11425->11404 11426->11404 11428 432ff2 VirtualFree 11427->11428 11431 432fae 11427->11431 11428->11404 11429 432fc0 GetDeviceDriverBaseNameW 11430 432fd9 lstrcmpiW 11429->11430 11429->11431 11430->11431 11432 433009 VirtualFree 11430->11432 11431->11428 11431->11429 11432->11404 11434 432f50 7 API calls 11433->11434 11435 433151 11434->11435 11436 432f50 7 API calls 11435->11436 11441 432ddb 11435->11441 11437 433160 11436->11437 11438 432f50 7 API calls 11437->11438 11437->11441 11439 43316c 11438->11439 11440 432f50 7 API calls 11439->11440 11439->11441 11440->11441 11441->11415 11442 432ad0 VirtualAlloc 11441->11442 11443 432b02 GetModuleFileNameW GetTempPathW 11442->11443 11445 432b48 11443->11445 11446 432b53 lstrlenW 11445->11446 11447 432b4c 11445->11447 11457 438730 CryptAcquireContextW 11446->11457 11485 432960 lstrlenW 11447->11485 11449 432b8e GetEnvironmentVariableW 11451 432bac 11449->11451 11453 432bd8 lstrcatW lstrcatW lstrcatW 11451->11453 11456 432bb0 11451->11456 11452 432c45 ExitThread 11468 432890 CreateFileW 11453->11468 11455 432c2f wsprintfW 11455->11447 11456->11452 11456->11455 11458 43875b VirtualAlloc 11457->11458 11459 438849 11457->11459 11461 438852 CryptReleaseContext VirtualFree 11458->11461 11462 43878b 11458->11462 11459->11449 11461->11449 11462->11461 11463 438793 GetModuleHandleA 11462->11463 11464 4387e7 GetProcAddress 11463->11464 11465 4387d9 LoadLibraryA 11463->11465 11467 4387f6 CryptReleaseContext VirtualFree 11464->11467 11465->11464 11465->11467 11467->11459 11469 4328f9 11468->11469 11470 4328b8 GetFileSize 11468->11470 11469->11456 11490 433030 11470->11490 11473 433030 7 API calls 11474 4328d5 CreateFileMappingW 11473->11474 11475 432902 MapViewOfFile 11474->11475 11476 4328f2 CloseHandle 11474->11476 11477 432916 11475->11477 11478 432948 CloseHandle CloseHandle 11475->11478 11476->11469 11479 433030 7 API calls 11477->11479 11478->11456 11480 43291b 11479->11480 11481 43292b 11480->11481 11495 438880 CryptAcquireContextW 11480->11495 11506 432830 CreateFileW 11481->11506 11486 438730 9 API calls 11485->11486 11487 4329ad RegCreateKeyExW 11486->11487 11488 432ac0 11487->11488 11489 432a8e lstrlenW RegSetValueExW RegCloseKey 11487->11489 11488->11452 11489->11452 11491 432f50 7 API calls 11490->11491 11492 43307f 11491->11492 11493 4328c8 11492->11493 11494 432f50 7 API calls 11492->11494 11493->11473 11494->11493 11496 438972 11495->11496 11497 4388ae 11495->11497 11496->11481 11497->11497 11498 4388bd VirtualAlloc 11497->11498 11499 43897b CryptReleaseContext VirtualFree 11498->11499 11500 4388d8 11498->11500 11499->11481 11500->11499 11501 4388e1 GetModuleHandleA 11500->11501 11502 438927 LoadLibraryA 11501->11502 11503 438935 GetProcAddress 11501->11503 11502->11503 11504 438959 CryptReleaseContext VirtualFree 11502->11504 11503->11504 11505 438944 11503->11505 11504->11496 11505->11504 11507 43285b 11506->11507 11508 43287f UnmapViewOfFile 11506->11508 11509 432873 11507->11509 11510 43285f WriteFile 11507->11510 11508->11478 11511 432878 CloseHandle 11509->11511 11510->11509 11510->11511 11511->11508 11516 fd1c9d 11513->11516 11515 fd1b44 11517 fd1ca9 __mtinitlocknum 11516->11517 11518 fd3170 __lock 51 API calls 11517->11518 11519 fd1cb0 11518->11519 11520 fd1d69 _doexit 11519->11520 11521 fd1cde DecodePointer 11519->11521 11536 fd1db7 11520->11536 11521->11520 11523 fd1cf5 DecodePointer 11521->11523 11529 fd1d05 11523->11529 11525 fd1dc6 __mtinitlocknum 11525->11515 11527 fd1d12 EncodePointer 11527->11529 11528 fd1dae 11530 fd1b13 __mtinitlocknum 3 API calls 11528->11530 11529->11520 11529->11527 11531 fd1d22 DecodePointer EncodePointer 11529->11531 11532 fd1db7 11530->11532 11534 fd1d34 DecodePointer DecodePointer 11531->11534 11533 fd1dc4 11532->11533 11541 fd32da LeaveCriticalSection 11532->11541 11533->11515 11534->11529 11537 fd1dbd 11536->11537 11538 fd1d97 11536->11538 11542 fd32da LeaveCriticalSection 11537->11542 11538->11525 11540 fd32da LeaveCriticalSection 11538->11540 11540->11528 11541->11533 11542->11538

                                                      Control-flow Graph

                                                      APIs
                                                      • Sleep.KERNELBASE(000003E8), ref: 00434B3B
                                                        • Part of subcall function 004347E0: VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043483C
                                                        • Part of subcall function 004347E0: lstrcpyW.KERNEL32(00000000,Global\,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043485F
                                                        • Part of subcall function 004347E0: lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00434866
                                                        • Part of subcall function 004347E0: CreateMutexW.KERNELBASE(00000000,00000000,00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043487E
                                                        • Part of subcall function 004347E0: GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043488A
                                                        • Part of subcall function 004347E0: GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00434891
                                                        • Part of subcall function 004347E0: VirtualFree.KERNEL32(00000000,00000000,00008000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004348AB
                                                      • ExitProcess.KERNEL32 ref: 00434B4C
                                                      • CreateThread.KERNEL32(00000000,00000000,00432D30,00000000,00000000,00000000), ref: 00434B61
                                                      • WaitForSingleObject.KERNEL32(00000000,00001388), ref: 00434B79
                                                      • TerminateThread.KERNEL32(00000000,00000000), ref: 00434B8C
                                                      • CloseHandle.KERNEL32(00000000), ref: 00434B96
                                                      • VirtualAlloc.KERNEL32(00000000,00000200,00003000,00000004,00000000,00000000,00000000,00000000), ref: 00434C0A
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00434C24
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00434C3D
                                                      • ExitProcess.KERNEL32 ref: 00434C45
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocCreateErrorExitFreeLastProcessThread$CloseFileHandleModuleMutexNameObjectSingleSleepTerminateWaitlstrcpylstrlen
                                                      • String ID: open
                                                      • API String ID: 1803241880-2758837156
                                                      • Opcode ID: 510f34315a944320fde0d297b71ddb95fff3216178cec1227e7fe0cfd4fcb831
                                                      • Instruction ID: 259d84bce463408e5f73b001bd175b929a173bc17ff6a376004f99816a8ac4ee
                                                      • Opcode Fuzzy Hash: 510f34315a944320fde0d297b71ddb95fff3216178cec1227e7fe0cfd4fcb831
                                                      • Instruction Fuzzy Hash: 8C711170A80308ABEB14DFE0DD5AFEE7774AB48705F106119F641762D0DBB86944CF59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 268 fe75c0-fe75e9 call fe75b0 271 fe75f0-fe75f3 268->271 272 fe760b-fe760c 271->272 273 fe75f5-fe7600 271->273 272->271 273->272 274 fe7602-fe7609 273->274 274->272 275 fe760e-fe7622 GetPEB 274->275 276 fe7628 275->276 277 fe77c5-fe77ea VirtualAlloc 275->277 278 fe7630-fe7639 276->278 279 fe77ff-fe7809 277->279 280 fe77ec-fe77ee 277->280 281 fe7640-fe764a 278->281 283 fe780b-fe7810 279->283 284 fe7842-fe7855 279->284 282 fe77f0-fe77fa 280->282 288 fe764f-fe765b 281->288 289 fe764c 281->289 282->282 290 fe77fc 282->290 285 fe7813-fe7822 283->285 286 fe78c9-fe78d5 284->286 287 fe7857-fe786e LoadLibraryA 284->287 291 fe7824-fe7830 285->291 292 fe7835-fe783d 285->292 293 fe78db-fe78f0 286->293 294 fe7981-fe79a0 call 434dd0 286->294 295 fe78b6-fe78c4 287->295 296 fe7870-fe7872 287->296 288->281 297 fe765d-fe7663 288->297 289->288 290->279 291->291 299 fe7832 291->299 292->285 300 fe783f 292->300 293->294 301 fe78f6-fe7903 293->301 295->287 298 fe78c6 295->298 302 fe7896-fe78a2 296->302 303 fe7874-fe7878 296->303 304 fe771d-fe7723 297->304 305 fe7669-fe768d 297->305 298->286 299->292 300->284 307 fe7905-fe7914 301->307 308 fe7963-fe7975 301->308 318 fe78a5-fe78ac 302->318 303->302 309 fe787a-fe7894 303->309 310 fe779e-fe77a2 304->310 311 fe7725-fe7746 304->311 312 fe7690-fe7698 305->312 316 fe7916-fe791f 307->316 317 fe7921-fe7925 307->317 308->301 313 fe797b-fe797e 308->313 309->318 314 fe77a4-fe77a6 310->314 315 fe77b2-fe77bc 310->315 320 fe7748-fe774e 311->320 321 fe76a0-fe76af 312->321 313->294 314->315 323 fe77a8-fe77aa 314->323 315->278 327 fe77c2 315->327 324 fe7959-fe795e 316->324 325 fe7927-fe7930 317->325 326 fe7932-fe7936 317->326 328 fe78ae 318->328 329 fe78b1-fe78b4 318->329 330 fe7750-fe775f 320->330 321->321 331 fe76b1-fe76b6 321->331 323->315 334 fe77ac-fe77b0 323->334 324->307 337 fe7960 324->337 325->324 335 fe7938-fe7947 326->335 336 fe7949-fe794d 326->336 327->277 328->329 329->295 329->296 330->330 338 fe7761-fe7767 330->338 332 fe76b8-fe76bd 331->332 333 fe76c6-fe76dc 331->333 332->333 341 fe76bf-fe76c4 332->341 342 fe76de-fe76e5 333->342 343 fe76e7-fe76ec 333->343 334->315 334->327 335->324 336->324 344 fe794f-fe7955 336->344 337->308 339 fe778a 338->339 340 fe7769-fe7788 338->340 345 fe778d-fe7796 339->345 340->345 341->333 346 fe770b-fe7715 341->346 347 fe7705 342->347 348 fe76ee-fe76f5 343->348 349 fe76f7-fe76fc 343->349 344->324 345->320 350 fe7798-fe779b 345->350 346->312 352 fe771b 346->352 347->346 348->347 349->347 351 fe76fe-fe7702 349->351 350->310 351->347 352->350
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction ID: acc3c6b7cf5f200e19a5288f6cb2b264b7ef56a4d6dde45517f8b293f951a3bf
                                                      • Opcode Fuzzy Hash: 794c13284e084b999102786f7c7132ff237cb24c9401df5e3aaca089a4b1fbef
                                                      • Instruction Fuzzy Hash: 48D1AE75E043568FCB24DF5AC880BA9B7B1FF58324F2945A9D855AB341E330ED41EB90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 437600-437617 1 437619-437638 VirtualAlloc GetUserNameW 0->1 2 43763e-437642 0->2 1->2 3 437666-437670 2->3 4 437644-437660 VirtualAlloc GetComputerNameW 2->4 5 437672-437687 VirtualAlloc 3->5 6 4376c6-4376ca 3->6 4->3 5->6 9 437689-43769f call 437580 5->9 7 4376d0-43770a VirtualAlloc RegOpenKeyExW 6->7 8 437765-437769 6->8 10 43774e-43775f VirtualFree 7->10 11 43770c-43772e RegQueryValueExW 7->11 12 437869-43786d 8->12 13 43776f-43779d VirtualAlloc * 2 8->13 15 4376a4-4376a6 9->15 10->8 16 437730-437737 11->16 17 437739 GetLastError 11->17 18 4378cb-4378cf 12->18 19 43786f-43789f VirtualAlloc call 437580 12->19 20 4377a4-4377d7 wsprintfW RegOpenKeyExW 13->20 21 4376b9-4376be 15->21 22 4376a8-4376af 15->22 25 43773f-43774c RegCloseKey 16->25 17->25 23 4378d1-4378f2 GetNativeSystemInfo VirtualAlloc 18->23 24 43793e-437942 18->24 19->18 51 4378a1-4378c8 call 437580 wsprintfW 19->51 27 437834-437836 20->27 28 4377d9-4377f9 RegQueryValueExW 20->28 34 4376c1-4376c3 wsprintfW 21->34 22->6 31 4376b1-4376b7 22->31 32 437933 23->32 33 4378f4-4378fb 23->33 36 437944-43795a call 437ce0 24->36 37 43795f-437963 24->37 25->8 25->10 35 437839-43783c 27->35 29 437804 GetLastError 28->29 30 4377fb-437802 28->30 41 43780a-437817 RegCloseKey 29->41 30->41 31->34 49 437938-43793b wsprintfW 32->49 33->32 42 437902-437911 wsprintfW ExitProcess 33->42 43 437917-43791c 33->43 44 437925-43792a 33->44 45 43791e-437923 33->45 46 43792c-437931 33->46 34->6 47 437846-437863 wsprintfW VirtualFree 35->47 48 43783e-437840 35->48 36->37 61 43795c 36->61 39 437aa9 37->39 40 437969-4379f7 VirtualAlloc * 2 GetWindowsDirectoryW GetVolumeInformationW call 437580 37->40 54 437aaf-437ab3 39->54 63 437a2a-437a6b wsprintfW lstrcatW GetModuleHandleW GetProcAddress 40->63 64 4379f9-437a25 lstrlenW call 437580 40->64 41->27 53 437819-437829 lstrcmpiW 41->53 43->49 44->49 45->49 46->49 47->12 48->20 48->47 49->24 51->18 53->42 58 43782f-437832 53->58 59 437c62-437c69 54->59 60 437ab9-437b09 VirtualAlloc 54->60 58->35 66 437cb0-437cbb 59->66 67 437c6b-437c87 VirtualAlloc 59->67 65 437b10-437b1b 60->65 61->37 69 437a89 63->69 70 437a6d-437a87 lstrlenW 63->70 64->63 65->65 73 437b1d-437b2f 65->73 71 437ca6 67->71 72 437c89-437c92 call 437160 67->72 74 437a90-437aa7 VirtualFree 69->74 70->74 71->66 72->66 81 437c94-437ca0 VirtualFree 72->81 75 437b32-437b4a GetDriveTypeW 73->75 74->54 78 437b50-437b53 75->78 79 437c3d 75->79 78->79 82 437b59-437ba0 lstrcatW * 3 GetDiskFreeSpaceW 78->82 83 437c43-437c4d 79->83 81->71 84 437c33-437c3b lstrcatW 82->84 85 437ba6-437c31 call 438f30 * 2 lstrlenW wsprintfW lstrlenW wsprintfW lstrcatW 82->85 83->75 86 437c53-437c5d lstrlenW 83->86 84->79 85->83 86->59
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00437627
                                                      • GetUserNameW.ADVAPI32(00000000,?), ref: 00437638
                                                      • VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00437656
                                                      • GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00437660
                                                      • VirtualAlloc.KERNELBASE(00000000,00000080,00003000,00000004), ref: 00437680
                                                      • wsprintfW.USER32 ref: 004376C1
                                                      • VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 004376DE
                                                      • RegOpenKeyExW.ADVAPI32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00437702
                                                      • RegQueryValueExW.ADVAPI32(?,LocaleName,00000000,00000000, HC,?), ref: 00437726
                                                      • GetLastError.KERNEL32 ref: 00437739
                                                      • RegCloseKey.ADVAPI32(?), ref: 00437742
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0043775F
                                                      • VirtualAlloc.KERNEL32(00000000,0000008A,00003000,00000004), ref: 0043777D
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00437793
                                                      • wsprintfW.USER32 ref: 004377AD
                                                      • RegOpenKeyExW.ADVAPI32(80000001,Keyboard Layout\Preload,00000000,00020019,?), ref: 004377CF
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000, HC,?), ref: 004377F1
                                                      • GetLastError.KERNEL32 ref: 00437804
                                                      • RegCloseKey.ADVAPI32(?), ref: 0043780D
                                                      • lstrcmpiW.KERNEL32(?,00000419), ref: 00437821
                                                      • wsprintfW.USER32 ref: 0043784E
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043785D
                                                      • VirtualAlloc.KERNEL32(00000000,00000082,00003000,00000004), ref: 0043787D
                                                      • wsprintfW.USER32 ref: 004378C6
                                                      • GetNativeSystemInfo.KERNEL32(?), ref: 004378D5
                                                      • VirtualAlloc.KERNEL32(00000000,00000040,00003000,00000004), ref: 004378E6
                                                      • wsprintfW.USER32 ref: 0043790A
                                                      • ExitProcess.KERNEL32 ref: 00437911
                                                      • wsprintfW.USER32 ref: 00437939
                                                      • VirtualAlloc.KERNELBASE(00000000,00000400,00003000,00000004), ref: 00437977
                                                      • VirtualAlloc.KERNELBASE(00000000,00000E0C,00003000,00000004), ref: 0043798A
                                                      • GetWindowsDirectoryW.KERNEL32(00000000,00000100), ref: 00437994
                                                      • GetVolumeInformationW.KERNELBASE(00000000,00000200,00000100,00000600,00000608,00000604,00000400,00000100), ref: 004379CE
                                                      • lstrlenW.KERNEL32(0000060C,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00437A00
                                                      • wsprintfW.USER32 ref: 00437A38
                                                      • lstrcatW.KERNEL32(?,0000060C), ref: 00437A4D
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlComputeCrc32), ref: 00437A59
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00437A60
                                                      • lstrlenW.KERNEL32(?), ref: 00437A70
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00437AA1
                                                        • Part of subcall function 00437CE0: VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,756EF3C0,?,760773E0), ref: 00437CFD
                                                        • Part of subcall function 00437CE0: VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00437D71
                                                        • Part of subcall function 00437CE0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00437D86
                                                        • Part of subcall function 00437CE0: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00437D9C
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004), ref: 00437AF8
                                                      • GetDriveTypeW.KERNEL32(?), ref: 00437B3F
                                                      • lstrcatW.KERNEL32(?,?), ref: 00437B66
                                                      • lstrcatW.KERNEL32(?,00440334), ref: 00437B78
                                                      • lstrcatW.KERNEL32(?,004403A8), ref: 00437B82
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?, HC,?,00000000), ref: 00437B98
                                                      • lstrlenW.KERNEL32(?,?,00000000, HC,00000000,00000000,00000000, HC,00000000), ref: 00437BE0
                                                      • wsprintfW.USER32 ref: 00437BFA
                                                      • lstrlenW.KERNEL32(?), ref: 00437C08
                                                      • wsprintfW.USER32 ref: 00437C1C
                                                      • lstrcatW.KERNEL32(?,004403C8), ref: 00437C2F
                                                      • lstrcatW.KERNEL32(?,004403CC), ref: 00437C3B
                                                      • lstrlenW.KERNEL32(?), ref: 00437C56
                                                      • VirtualAlloc.KERNEL32(00000000,00000081,00003000,00000004), ref: 00437C79
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000), ref: 00437CA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$wsprintf$Freelstrcat$lstrlen$CloseErrorLastNameOpenQueryValue$AddressComputerCreateDirectoryDiskDriveExitHandleInfoInformationModuleNativeProcProcessSnapshotSpaceSystemToolhelp32TypeUserVolumeWindowslstrcmpi
                                                      • String ID: HC$%I64u$%I64u/$00000419$?:\$@$ARM$CDROM$Control Panel\International$Domain$FIXED$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Identifier$Itanium$Keyboard Layout\Preload$LocaleName$NO_ROOT_DIR$ProcessorNameString$RAMDISK$REMOTE$REMOVABLE$RtlComputeCrc32$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion$SYSTEM\CurrentControlSet\services\Tcpip\Parameters$UNKNOWN$Unknown$WORKGROUP$error$ntdll.dll$productName$undefined$x64$x86
                                                      • API String ID: 153366582-3118981487
                                                      • Opcode ID: 2759df5b08363d1af26ce123b5e1ec21710157d4ce9f6850e5a6b69b8439aa81
                                                      • Instruction ID: a62553e4ba828ed4612e03980f7297fffbc922da8bdfb12e0ea806a2768df308
                                                      • Opcode Fuzzy Hash: 2759df5b08363d1af26ce123b5e1ec21710157d4ce9f6850e5a6b69b8439aa81
                                                      • Instruction Fuzzy Hash: 6812A6B0680304BFE7259F64CD4AFAEBBB4BF08704F10151AF685A61E0D7B9A914CB5D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 91 437210-437228 92 43722a-43724a lstrcatW * 4 91->92 93 43724c-43724f 91->93 92->93 94 437251-43726b lstrcatW * 4 93->94 95 43726d-437271 93->95 94->95 96 437273-43728d lstrcatW * 4 95->96 97 43728f-437293 95->97 96->97 98 4372b1-4372b5 97->98 99 437295-4372af lstrcatW * 4 97->99 100 4372d3-4372d7 98->100 101 4372b7-4372d1 lstrcatW * 4 98->101 99->98 102 4372f5-4372f9 100->102 103 4372d9-4372f3 lstrcatW * 4 100->103 101->100 104 437317-43731b 102->104 105 4372fb-437315 lstrcatW * 4 102->105 103->102 106 437339-43733d 104->106 107 43731d-437337 lstrcatW * 4 104->107 105->104 108 43735b-43735f 106->108 109 43733f-437359 lstrcatW * 4 106->109 107->106 110 437361-43737a VirtualAlloc 108->110 111 4373cc-4373d0 108->111 109->108 114 437391-43739d wsprintfW 110->114 115 43737c-43738f wsprintfW 110->115 112 4373d2-4373ec lstrcatW * 4 111->112 113 4373ee-437402 lstrlenW 111->113 112->113 116 4373a0-4373c6 lstrcatW * 4 VirtualFree 114->116 115->116 116->111
                                                      APIs
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00437231
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437239
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437242
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043724A
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00437255
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043725D
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437263
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043726B
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00437277
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043727F
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437285
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043728D
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00437299
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372A1
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372A7
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372AF
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 004372BB
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372C3
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372C9
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372D1
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 004372DD
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372E5
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372EB
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004372F3
                                                      • lstrcatW.KERNEL32(?,FKC,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 004372FF
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437307
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043730D
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437315
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00437321
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437329
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043732F
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437337
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 00437343
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043734B
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437351
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437359
                                                      • VirtualAlloc.KERNELBASE(00000000,00000042,00003000,00000040,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000), ref: 0043736C
                                                      • wsprintfW.USER32 ref: 00437386
                                                      • wsprintfW.USER32 ref: 00437397
                                                      • lstrcatW.KERNEL32(?,?,?,00000000,00000000,?,00000000), ref: 004373A4
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,00000000,00000000,?,00000000), ref: 004373AC
                                                      • lstrcatW.KERNEL32(?,?,?,00000000,00000000,?,00000000), ref: 004373B2
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,00000000,00000000,?,00000000), ref: 004373BA
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 004373C6
                                                      • lstrcatW.KERNEL32(?,?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000), ref: 004373D6
                                                      • lstrcatW.KERNEL32(?,0043FFF8,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004373DE
                                                      • lstrcatW.KERNEL32(?,?,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004373E4
                                                      • lstrcatW.KERNEL32(?,0043FFFC,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004373EC
                                                      • lstrlenW.KERNEL32(?,00000000,00000000,?,?,00434879,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004373EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtualwsprintf$AllocFreelstrlen
                                                      • String ID: %x%x$FKC$undefined
                                                      • API String ID: 3872469520-1630041561
                                                      • Opcode ID: ce0aacd2c557261a61b19dbd1abd15f72bfa26219bbfe1e5f34f59a176a0db1f
                                                      • Instruction ID: 7689675a593380f58a1ffeaf2a74be0481d0b19a4b569ea59ddbc8c5faeaa7e3
                                                      • Opcode Fuzzy Hash: ce0aacd2c557261a61b19dbd1abd15f72bfa26219bbfe1e5f34f59a176a0db1f
                                                      • Instruction Fuzzy Hash: 63514D31146668B6DF273F618C49F9F3E19EFCA701F211062FD00540968B6D8666DFAE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 174 fd123b-fd125b call fd2790 call fd25d3 179 fd125d-fd125f 174->179 180 fd1261-fd1270 174->180 181 fd1294-fd129e call fd1de0 179->181 180->179 182 fd1272-fd127e 180->182 187 fd12a8-fd12af call fd1a4c 181->187 188 fd12a0-fd12a7 call fd138f 181->188 182->179 183 fd1280-fd1289 182->183 183->181 186 fd128b-fd1291 183->186 186->181 193 fd12b9-fd12c9 call fd26bc call fd1df5 187->193 194 fd12b1-fd12b8 call fd138f 187->194 188->187 201 fd12cb-fd12d2 call fd138f 193->201 202 fd12d3-fd12ef GetCommandLineA call fd26fc call fd20a9 193->202 194->193 201->202 209 fd12f9-fd1300 call fd22d8 202->209 210 fd12f1-fd12f8 call fd1b29 202->210 215 fd130a-fd1314 call fd1b63 209->215 216 fd1302-fd1309 call fd1b29 209->216 210->209 221 fd131d-fd1334 call fd11a8 215->221 222 fd1316-fd131c call fd1b29 215->222 216->215 226 fd1339-fd1343 221->226 222->221 227 fd134b-fd138e call fd1b54 call fd27d5 226->227 228 fd1345-fd1346 call fd1dcc 226->228 228->227
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__setargv__setenvp
                                                      • String ID: .$$XO\
                                                      • API String ID: 3919536372-2616302168
                                                      • Opcode ID: 24c9c4311bc750d5e0ccac79c5dd694301c6fb432178821fd52028e7db77623e
                                                      • Instruction ID: 4c4a3c52a4f298ec50975f80f6b0a156269d8a53e5fc2565a9e4a997c25d44ed
                                                      • Opcode Fuzzy Hash: 24c9c4311bc750d5e0ccac79c5dd694301c6fb432178821fd52028e7db77623e
                                                      • Instruction Fuzzy Hash: 8621A871A00305BAEB10BBB0AC46B6D32577F10312F1C412BF504D63D2EF798944F6A1

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00433BD0: GetProcessHeap.KERNEL32(?,?,00434817,00000000,?,00000000,00000000), ref: 00433C6C
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00437627
                                                        • Part of subcall function 00437600: GetUserNameW.ADVAPI32(00000000,?), ref: 00437638
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00437656
                                                        • Part of subcall function 00437600: GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00437660
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNELBASE(00000000,00000080,00003000,00000004), ref: 00437680
                                                        • Part of subcall function 00437600: wsprintfW.USER32 ref: 004376C1
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 004376DE
                                                        • Part of subcall function 00437600: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00437702
                                                        • Part of subcall function 00437600: RegQueryValueExW.ADVAPI32(?,LocaleName,00000000,00000000, HC,?), ref: 00437726
                                                        • Part of subcall function 00437600: RegCloseKey.ADVAPI32(?), ref: 00437742
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437462
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043746D
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437483
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043748E
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374A4
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374AF
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374C5
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(00434B46,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374D0
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374E6
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374F1
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437507
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437512
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437531
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043753C
                                                      • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043483C
                                                      • lstrcpyW.KERNEL32(00000000,Global\,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043485F
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00434866
                                                      • CreateMutexW.KERNELBASE(00000000,00000000,00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043487E
                                                      • GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 0043488A
                                                      • GetLastError.KERNEL32(?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00434891
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004348AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Virtual$Alloc$ErrorLastName$CloseComputerCreateFreeHeapMutexOpenProcessQueryUserValuelstrcpywsprintf
                                                      • String ID: Global\
                                                      • API String ID: 3131499543-188423391
                                                      • Opcode ID: c44c51e84d478383cc654803b70d6c840e8462e3207af0c2bc696bfb1746a790
                                                      • Instruction ID: 5200edbe95c3a89c1697d8105df1adbe9b1e47502206c23b252a156d01117bc5
                                                      • Opcode Fuzzy Hash: c44c51e84d478383cc654803b70d6c840e8462e3207af0c2bc696bfb1746a790
                                                      • Instruction Fuzzy Hash: AD2143706943147BE128BB24CC4BFBF7A28DB94B44F10052DB645660D0AA987D0486EE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 254 fd11a8-fd1201 OpenProcess GetLastError 255 fd120a-fd120c 254->255 256 fd1203 254->256 258 fd120e-fd1228 255->258 257 fd1204 ExitProcess 256->257 258->258 259 fd122a-fd1232 call fd1113 258->259 259->257 262 fd1234 ExitThread 259->262
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000000,00000000,00000000), ref: 00FD11F2
                                                      • GetLastError.KERNEL32 ref: 00FD11F8
                                                      • ExitProcess.KERNEL32(00000000), ref: 00FD1204
                                                      • ExitThread.KERNEL32 ref: 00FD1234
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitProcess$ErrorLastOpenThread
                                                      • String ID: -$1
                                                      • API String ID: 153595879-1877142845
                                                      • Opcode ID: dbf335a80af57721a373f0a47146686aed70db8ee54d8d1fd812214ff50e9b6d
                                                      • Instruction ID: 39e37954ade39b9d0e22eeca014c4be64610bbb521af32e5e05f9d038b420d79
                                                      • Opcode Fuzzy Hash: dbf335a80af57721a373f0a47146686aed70db8ee54d8d1fd812214ff50e9b6d
                                                      • Instruction Fuzzy Hash: D501ADB0D01219ABDB149FB5980C7EEBFBAFF09751F10812AD115E6291D3B40981EBE4

                                                      Control-flow Graph

                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(?,?,00000000,00020019,?,?,0000060C,?,004379F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 00437596
                                                      • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,00000080,?,?,004379F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 004375B7
                                                      • RegCloseKey.KERNELBASE(?,?,004379F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 004375C7
                                                      • GetLastError.KERNEL32(?,004379F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 004375D6
                                                      • RegCloseKey.ADVAPI32(?,?,004379F5,80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,ProcessorNameString,0000060C,00000080), ref: 004375DF
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$ErrorLastOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 2437438455-0
                                                      • Opcode ID: 50f1296fbe005f4d514e5e73b39dcfade595f4cb02c2d4eb407e96724553dec0
                                                      • Instruction ID: 3513fe0f41514a3fe818a8c1ca9a075d39d7cadd0e503532e746727269c7a951
                                                      • Opcode Fuzzy Hash: 50f1296fbe005f4d514e5e73b39dcfade595f4cb02c2d4eb407e96724553dec0
                                                      • Instruction Fuzzy Hash: 7B012C7264111CFBDB209F94ED09DDABB78EB08351F008162FD05D6120D7329A34EBE5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 354 fd1113-fd1134 call fdb4a0 call fd1069 359 fd1186-fd11a7 call fdb4e8 354->359 360 fd1136-fd1154 VirtualProtect 354->360 360->359 361 fd1156-fd115a call fe75c0 360->361 366 fd115c-fd116c 361->366 367 fd116f-fd1180 VirtualProtect 361->367 366->367 367->359
                                                      APIs
                                                      • VirtualProtect.KERNELBASE(00FE20C0,00012400,00000040,00000002,00FDFD30,00000018,00FD122F), ref: 00FD114C
                                                      • VirtualProtect.KERNELBASE(00FE20C0,00012400,00000002,?), ref: 00FD1180
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: a575496715ffb97dfe96e2e5cf3493775e1783eb0543a58548d37cced62cabfe
                                                      • Instruction ID: 1cf86a20bb4d178dab8c6ad9c66637ea4398d85d825132eca27c0a0458430c14
                                                      • Opcode Fuzzy Hash: a575496715ffb97dfe96e2e5cf3493775e1783eb0543a58548d37cced62cabfe
                                                      • Instruction Fuzzy Hash: 080171B1940309AADB10EFE58C46EDDB7BABF08710F58511AE601F62C1D774D640EA35

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 370 fd5982-fd5990 371 fd59ad-fd59cd call fd5958 LCMapStringW 370->371 372 fd5992-fd59ac LCMapStringEx 370->372
                                                      APIs
                                                      • LCMapStringEx.KERNELBASE(?,?,?,?,?,5EFC4D8B,00000000,00000000,00000000,?,00FD55A0,?,?,00000000,?,00000000), ref: 00FD59A9
                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,5EFC4D8B,?,00FD55A0,?,?,00000000,?,00000000,00000000), ref: 00FD59C6
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: String
                                                      • String ID:
                                                      • API String ID: 2568140703-0
                                                      • Opcode ID: d08033042f2598613868b70d6831cd1a4cd94775e720337cc696cc366ae95281
                                                      • Instruction ID: a44501e951f873170fcd98459423a4a044dd7f1aeac133862b4e04ce0708c331
                                                      • Opcode Fuzzy Hash: d08033042f2598613868b70d6831cd1a4cd94775e720337cc696cc366ae95281
                                                      • Instruction Fuzzy Hash: 4FF07F3201014EFFDF069F94EC0ACAE3B6AFB08360B048115FA2885020D772A971FBA1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 375 434dd0-434de7 376 434de9 375->376 377 434ded-434e09 CreateThread 375->377 378 434e15-434e1b 376->378 377->378 379 434e0b-434e0f CloseHandle 377->379 379->378
                                                      APIs
                                                      • CreateThread.KERNELBASE(00000000,00000000,00434B30,00000000,00000000,00000000), ref: 00434DFC
                                                      • CloseHandle.KERNEL32(00000000), ref: 00434E0F
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateHandleThread
                                                      • String ID:
                                                      • API String ID: 3032276028-0
                                                      • Opcode ID: f15bb76eeb390713cf23b1aa4dedcbcb12aeb9e1d63bea81addf2df97737fffc
                                                      • Instruction ID: ab00b43da8913ad787f121c3b9dbab8b04f0021a1a2fa3c5e2840548e075ecbb
                                                      • Opcode Fuzzy Hash: f15bb76eeb390713cf23b1aa4dedcbcb12aeb9e1d63bea81addf2df97737fffc
                                                      • Instruction Fuzzy Hash: 42F03034A80308FBDB14DF94DC0ABDDB770EB58705F20905AE911673C0D6B57A50CB09
                                                      APIs
                                                        • Part of subcall function 00438130: GetTickCount.KERNEL32 ref: 00438139
                                                        • Part of subcall function 00438130: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 0043818F
                                                        • Part of subcall function 00438130: VirtualAlloc.KERNEL32(00000000,00000000), ref: 004381A1
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,00000000), ref: 004381B1
                                                        • Part of subcall function 00438130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004381BB
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,00440604), ref: 004381D1
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,00000000), ref: 0043822C
                                                        • Part of subcall function 00438130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043823A
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,0043FFF8), ref: 00438280
                                                      • VirtualAlloc.KERNEL32(00000000,00000008,00003000,00000040,00000001,?,00000001,00000001,?,00000001), ref: 00435969
                                                      • CryptBinaryToStringA.CRYPT32(00000000,00000000,40000001,00000000,?,?,00000001,00000001,?,00000001), ref: 00435A1C
                                                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,00000001,00000001,?,00000001), ref: 00435A35
                                                      • lstrlenA.KERNEL32(00000000,?,00000001,00000001,?,00000001), ref: 00435A3E
                                                      • lstrlenA.KERNEL32(?,?,00000001,00000001,?,00000001), ref: 00435A46
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000040,?,00000001,00000001,?,00000001), ref: 00435A5B
                                                      • lstrlenA.KERNEL32 ref: 00435A77
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435A9E
                                                      • lstrlenA.KERNEL32(?), ref: 00435ABD
                                                      • lstrlenA.KERNEL32(?), ref: 00435AE4
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435AF5
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435B17
                                                      • lstrcatW.KERNEL32(?,action=call&), ref: 00435B2B
                                                      • lstrlenW.KERNEL32(?), ref: 00435B38
                                                      • lstrcatW.KERNEL32(756EE0B0,&id=,756EE0B0), ref: 00435B9A
                                                      • lstrcatW.KERNEL32(756EE0B0,?), ref: 00435BA1
                                                      • lstrcatW.KERNEL32(756EE0B0,&subid=), ref: 00435BA9
                                                      • lstrcatW.KERNEL32(756EE0B0,?), ref: 00435BB0
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00435BC3
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00435BD0
                                                      • lstrcatW.KERNEL32(756EE0B0,&pub_key=), ref: 00435BD8
                                                      • lstrlenW.KERNEL32(756EE0B0), ref: 00435BE5
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435BEE
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,756EE0B0,00000000), ref: 00435BFF
                                                      • lstrcatW.KERNEL32(?,&priv_key=), ref: 00435C0F
                                                      • lstrlenW.KERNEL32(?), ref: 00435C16
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435C1F
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000), ref: 00435C30
                                                      • lstrcatW.KERNEL32(0043FCB0,00760026), ref: 00435C8D
                                                      • lstrlenW.KERNEL32(?), ref: 00435C98
                                                      • VirtualAlloc.KERNEL32(00000000,-00000012,00003000,00000040), ref: 00435CAE
                                                      • lstrlenW.KERNEL32(?), ref: 00435CB9
                                                      • lstrlenW.KERNEL32(?), ref: 00435CDD
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00435CF5
                                                      • lstrlenW.KERNEL32(?,00003000,00000004), ref: 00435D06
                                                      • VirtualAlloc.KERNEL32(00000000,-00000002), ref: 00435D0E
                                                      • wsprintfA.USER32 ref: 00435D27
                                                        • Part of subcall function 00436010: VirtualAlloc.KERNEL32(00000000,0000000A,00003000,00000004,00000000,00000000), ref: 00436033
                                                        • Part of subcall function 00436010: GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00436048
                                                        • Part of subcall function 00436010: GetProcAddress.KERNEL32(00000000,RtlComputeCrc32), ref: 00436059
                                                        • Part of subcall function 00436010: lstrlenA.KERNEL32(00000000), ref: 00436064
                                                        • Part of subcall function 00436010: wsprintfA.USER32 ref: 0043607C
                                                        • Part of subcall function 00436010: _memset.LIBCMT ref: 0043609B
                                                        • Part of subcall function 00436010: lstrlenA.KERNEL32(00000000), ref: 004360A4
                                                        • Part of subcall function 00436010: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004360D3
                                                      • CryptBinaryToStringA.CRYPT32(?,756EE0B0,40000001,00000000,?), ref: 00435D61
                                                      • GetLastError.KERNEL32(?,00000001,00000001,?,00000001), ref: 00435D6B
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435D72
                                                      • VirtualAlloc.KERNEL32(00000000,00000002,00003000,00000040), ref: 00435D81
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435D8C
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435DAC
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435DD4
                                                      • lstrlenA.KERNEL32(00000000), ref: 00435DE3
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000), ref: 00435DF4
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00435E2C
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00435E3A
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00435E47
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00435E6C
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00435E7A
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000001,00000001,?,00000001), ref: 00435E87
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00435E9E
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00435EB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Virtual$Free$lstrcat$Alloc$BinaryByteCharCryptMultiStringWide$wsprintf$AddressCountErrorHandleLastModuleProcTick_memset
                                                      • String ID: &$&advert=+380668846667$&id=$&priv_key=$&pub_key=$&subid=$.$.$=$action=call&$e$o$popkadurak$s
                                                      • API String ID: 3331976855-889238998
                                                      • Opcode ID: f8b72f1225a0d917f4ae91d51a1f1bf55770924196addbf8a80f893759e7f761
                                                      • Instruction ID: 4a204a3c7df4551d7f0b658188d3845bbb2bf401ece93798b97eae74eec981cc
                                                      • Opcode Fuzzy Hash: f8b72f1225a0d917f4ae91d51a1f1bf55770924196addbf8a80f893759e7f761
                                                      • Instruction Fuzzy Hash: 3D029C71548305AFD720DF24CC85B5BBBE9FF88704F10192EF585A7290D7B8E9098B9A
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 0043540F
                                                      • VirtualAlloc.KERNEL32(00000000,00000002,00003000,00000040,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 00435426
                                                      • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0043544B
                                                      • lstrlenA.KERNEL32(?,00003000,00000004,00000000,?,?,?,?,00435643,00000000,?), ref: 004354A7
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,?,?,?,?,00435643,00000000,?), ref: 004354B1
                                                      • lstrcpyA.KERNEL32(00000000,?,?,?,?,?,00435643,00000000,?), ref: 004354C2
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00435643,00000000,?), ref: 004354DD
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00435643,00000000,?), ref: 004354EE
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 004354FD
                                                      • GetLastError.KERNEL32(?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 0043550C
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00435542
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00435562
                                                      • VirtualAlloc.KERNEL32(00000000,00032001,00003000,00000040), ref: 00435574
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0043558E
                                                      • lstrlenA.KERNEL32(00000000), ref: 004355E3
                                                      • lstrlenW.KERNEL32(?), ref: 004355EF
                                                      • lstrlenA.KERNEL32(00000000,00000000,00031FFF,?,00000000), ref: 0043560B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00000000,00000000,?,00000000), ref: 00435665
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00435671
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 0043567B
                                                      • InternetCloseHandle.WININET(zXC), ref: 00435685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Freelstrlen$Alloc$Heap$BinaryCloseCryptErrorHandleInternetLastStringlstrcatlstrcpy
                                                      • String ID: POST$zXC
                                                      • API String ID: 1287001821-776939764
                                                      • Opcode ID: ee42ce115a4b16cb4ba2bcb3b104a9aba2a8884fbf59fced4c2d2c13c9f94483
                                                      • Instruction ID: 1e01e09f9a7e2494bec5d6e0a50989de2f934f58deb692394d2adba2b7df040f
                                                      • Opcode Fuzzy Hash: ee42ce115a4b16cb4ba2bcb3b104a9aba2a8884fbf59fced4c2d2c13c9f94483
                                                      • Instruction Fuzzy Hash: 3271D371E40705ABEB109FA5CC45FAFBB78FF88700F105126FA44A3250DB78AA44CB99
                                                      APIs
                                                        • Part of subcall function 00438130: GetTickCount.KERNEL32 ref: 00438139
                                                        • Part of subcall function 00438130: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 0043818F
                                                        • Part of subcall function 00438130: VirtualAlloc.KERNEL32(00000000,00000000), ref: 004381A1
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,00000000), ref: 004381B1
                                                        • Part of subcall function 00438130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004381BB
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,00440604), ref: 004381D1
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,00000000), ref: 0043822C
                                                        • Part of subcall function 00438130: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043823A
                                                        • Part of subcall function 00438130: lstrcatW.KERNEL32(00000000,0043FFF8), ref: 00438280
                                                      • VirtualAlloc.KERNEL32(00000000,00004C02,00003000,00000040,?,00000000,?), ref: 004356E4
                                                      • wsprintfW.USER32 ref: 00435714
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000), ref: 0043575D
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000), ref: 00435779
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 00435790
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004,?,00000000,00000000,?,00000000), ref: 0043579E
                                                      • VirtualAlloc.KERNEL32(00000000,-00000002,?,00000000,00000000,?,00000000), ref: 004357A6
                                                      • wsprintfA.USER32 ref: 004357BC
                                                      • CryptBinaryToStringA.CRYPT32(?,756EE0B0,40000001,00000000,?,?,00000000,00000000,?,00000000), ref: 004357F0
                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,00000000), ref: 004357FA
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00435807
                                                      • VirtualAlloc.KERNEL32(00000000,-00000004,00003000,00000040,?,00000000,00000000,?,00000000), ref: 00435819
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00435823
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00435841
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00435860
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,00000000,?,00000000), ref: 004358A0
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 004358AC
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,?,00000000), ref: 004358C3
                                                      Strings
                                                      • popkadurak, xrefs: 004356C7
                                                      • action=result&e_files=%d&e_size=%I64u&e_time=%d&, xrefs: 0043570E
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$lstrlen$Free$Alloclstrcat$wsprintf$BinaryCountCryptErrorLastStringTick
                                                      • String ID: action=result&e_files=%d&e_size=%I64u&e_time=%d&$popkadurak
                                                      • API String ID: 487841380-2102589890
                                                      • Opcode ID: 7bc97a010d46d3dfa9836f98c47bd523f482a879171de50c4fdab0066587ea16
                                                      • Instruction ID: 16b2db685a16c9f9b50c1a8262274fe9e582f6e79b8917032972418e11f9387f
                                                      • Opcode Fuzzy Hash: 7bc97a010d46d3dfa9836f98c47bd523f482a879171de50c4fdab0066587ea16
                                                      • Instruction Fuzzy Hash: 3E518170E40218BBEB249F65CD46FAF7B78EF48704F10106AF645A6290DB786E148B99
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,00000000), ref: 00436CC2
                                                      • lstrcatW.KERNEL32(00000000,0043FF64,?,00000000), ref: 00436CD4
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,00000000), ref: 00436CE2
                                                      • lstrcmpW.KERNEL32(?,0043FF68,?,00000000), ref: 00436D0C
                                                      • lstrcmpW.KERNEL32(?,0043FF6C,?,00000000), ref: 00436D22
                                                      • lstrcatW.KERNEL32(00000000,?,?,00000000), ref: 00436D34
                                                      • lstrlenW.KERNEL32(00000000,?,00000000), ref: 00436D3B
                                                      • lstrcmpW.KERNEL32(-00000001,.sql,?,00000000), ref: 00436D6A
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,00000000), ref: 00436D81
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000), ref: 00436D8C
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,00000000), ref: 00436DAA
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000), ref: 00436DBF
                                                      • lstrlenA.KERNEL32(*******************,?,00000000), ref: 00436DDE
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00436DF9
                                                      • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00436E03
                                                      • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 00436E2C
                                                      • FindClose.KERNEL32(?,?,00000000), ref: 00436E3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Findlstrcmplstrlen$CloseVirtuallstrcat$AllocCreateFirstFreeHandleNextReadSize
                                                      • String ID: *******************$.sql$FoC
                                                      • API String ID: 3616287438-3199560638
                                                      • Opcode ID: 41295924c2982df45563df33fbc22a3da42de978ebdedaee3a044bf2b5e783dd
                                                      • Instruction ID: 154a3f852d3e68e5b8d199ea9b10af92f83cc8ba9f43ebfbca36aa04c439a7ac
                                                      • Opcode Fuzzy Hash: 41295924c2982df45563df33fbc22a3da42de978ebdedaee3a044bf2b5e783dd
                                                      • Instruction Fuzzy Hash: B1417171A40216BBDB10AF64DC49FAF77BCEF09700F11A07AF941E2250DB789A15CB69
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(00443058,?,004338F4,00000000,00000000,00000000,?,00000800), ref: 0043677B
                                                      • CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,?,004338F4,00000000,00000000,00000000), ref: 004367A1
                                                      • GetLastError.KERNEL32(?,004338F4,00000000,00000000,00000000), ref: 004367AB
                                                      • CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,004338F4,00000000,00000000,00000000), ref: 004367C7
                                                      • LeaveCriticalSection.KERNEL32(00443058,?,004338F4,00000000,00000000,00000000), ref: 004367D6
                                                      • LeaveCriticalSection.KERNEL32(00443058,?,004338F4,00000000,00000000,00000000), ref: 004367EA
                                                      • CryptImportKey.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,?,004338F4,00000000,00000000), ref: 00436812
                                                      • CryptGetKeyParam.ADVAPI32(00000000,00000008,004338F4,0000000A,00000000,?,004338F4,00000000), ref: 00436833
                                                      • CryptEncrypt.ADVAPI32(00000000,00000000,00000001,00000000,0000000A,00000000,004338F4,?,004338F4,00000000), ref: 0043685B
                                                      • GetLastError.KERNEL32(?,004338F4,00000000), ref: 00436864
                                                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,004338F4,00000000,00000000), ref: 00436881
                                                      • LeaveCriticalSection.KERNEL32(00443058,?,004338F4,00000000,00000000), ref: 0043688C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$CriticalSection$ContextLeave$AcquireErrorLast$EncryptEnterImportParamRelease
                                                      • String ID: Microsoft Enhanced Cryptographic Provider v1.0
                                                      • API String ID: 3173605824-1948191093
                                                      • Opcode ID: 0e0a048ea892ab32ce8c7366eb9b4cf964e1db8335bc1e49bb5ed8f98aab4d99
                                                      • Instruction ID: 32e3c8fdeaff6c6d3323de5a700303564d74c0eed246302fbd441789a465c971
                                                      • Opcode Fuzzy Hash: 0e0a048ea892ab32ce8c7366eb9b4cf964e1db8335bc1e49bb5ed8f98aab4d99
                                                      • Instruction Fuzzy Hash: D131A274A80309FBEB14DFA0DD49F9E77B4BB0CB01F109419F601A62D0DB789A049B6A
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 004388A0
                                                      • VirtualAlloc.KERNEL32(00000000,00000007,00003000,00000040), ref: 004388C8
                                                      • GetModuleHandleA.KERNEL32(?), ref: 0043891D
                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 0043892B
                                                      • GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 0043893A
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0043895E
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043896C
                                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0043292B), ref: 00438980
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,?,?,0043292B), ref: 0043898E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtual$FreeRelease$AcquireAddressAllocHandleLibraryLoadModuleProc
                                                      • String ID: +)C$Advapi32.dll$CryptGenRandomAdvapi32.dll
                                                      • API String ID: 3996966626-3562963855
                                                      • Opcode ID: bdc47e917cd96e78b25b98ca702dcb3d60257618ce87bbb665803f7cf372b6c6
                                                      • Instruction ID: 94ed8f11723f58c0ceade5f673b7aad24be7eded976a1cf52f37bedd84d460e3
                                                      • Opcode Fuzzy Hash: bdc47e917cd96e78b25b98ca702dcb3d60257618ce87bbb665803f7cf372b6c6
                                                      • Instruction Fuzzy Hash: 7A31DB75A40208AFDF10CFA5DC49BEEBB78EF48701F10506DF601E5250DB749A10CB6A
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000000,?,?), ref: 00436F60
                                                      • lstrcatW.KERNEL32(00000000,0043FF64,?,?), ref: 00436F78
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?), ref: 00436F82
                                                        • Part of subcall function 004368A0: VirtualAlloc.KERNEL32(00000000,00000201,00003000,00000040,00000000,?,?,00000000,?,00436F26,00000000,?,?), ref: 004368BC
                                                        • Part of subcall function 004368A0: VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00000000,?,00436F26,00000000,?,?), ref: 00436914
                                                      • lstrcmpW.KERNEL32(?,0043FF68,?,?), ref: 00436FB0
                                                      • lstrcmpW.KERNEL32(?,0043FF6C,?,?), ref: 00436FCA
                                                      • lstrcatW.KERNEL32(00000000,?,?,?), ref: 00436FE0
                                                      • lstrcatW.KERNEL32(00000000,0043FFA4,?,?), ref: 00437007
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?), ref: 0043708D
                                                      • FindClose.KERNEL32(00000000,?,?), ref: 0043709E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Findlstrcat$FileVirtuallstrcmp$AllocCloseFirstFreeNextlstrlen
                                                      • String ID: SQL
                                                      • API String ID: 991218351-1299261525
                                                      • Opcode ID: 8caa70a0deb192c90fe91785785ee40a52ac4c4529b630e69311878d29a866ed
                                                      • Instruction ID: aaafa7620e5b8d118cab4b8575951e93e10bba7dcbcc2df595aabc3a2b094abf
                                                      • Opcode Fuzzy Hash: 8caa70a0deb192c90fe91785785ee40a52ac4c4529b630e69311878d29a866ed
                                                      • Instruction Fuzzy Hash: BB51C671A04209ABDF24DF65EC84AAE77B9EF4C314F0050ABF908D7250D7399E149F59
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 0043874D
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 0043877B
                                                      • GetModuleHandleA.KERNEL32(?), ref: 004387CF
                                                      • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 004387DD
                                                      • GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 004387EC
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00438835
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00438843
                                                      • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00438857
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00438865
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtual$FreeRelease$AcquireAddressAllocHandleLibraryLoadModuleProc
                                                      • String ID: Advapi32.dll$CryptGenRandomAdvapi32.dll
                                                      • API String ID: 3996966626-2152921537
                                                      • Opcode ID: 911351f24165fa7eaf494d2e389e262030128a5ed9dc25737fdad033713c3afe
                                                      • Instruction ID: 695a1934e568c2e87584e475b85c0918550c98b40ca8976c1a78554fcc220862
                                                      • Opcode Fuzzy Hash: 911351f24165fa7eaf494d2e389e262030128a5ed9dc25737fdad033713c3afe
                                                      • Instruction Fuzzy Hash: 3031E575A00309AADF249FE5DC49BEEFB78EF09700F20506EF501A6250EB749A11CB6D
                                                      APIs
                                                      • CryptAcquireContextW.ADVAPI32(00434BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,00434BA6,?,00434BAE), ref: 00436508
                                                      • GetLastError.KERNEL32(?,00434BAE), ref: 00436512
                                                      • CryptAcquireContextW.ADVAPI32(00434BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,00434BAE), ref: 0043652E
                                                      • CryptGenKey.ADVAPI32(00434BAE,0000A400,08000001,?,?,00434BAE), ref: 0043655A
                                                      • CryptExportKey.ADVAPI32(?,00000000,00000006,00000000,?,00000000), ref: 0043657E
                                                      • CryptExportKey.ADVAPI32(?,00000000,00000007,00000000,?,?), ref: 00436596
                                                      • CryptDestroyKey.ADVAPI32(?), ref: 004365A0
                                                      • CryptReleaseContext.ADVAPI32(00434BAE,00000000), ref: 004365AC
                                                      • CryptAcquireContextW.ADVAPI32(00434BAE,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000010), ref: 004365C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$Context$Acquire$Export$DestroyErrorLastRelease
                                                      • String ID: Microsoft Enhanced Cryptographic Provider v1.0
                                                      • API String ID: 137402220-1948191093
                                                      • Opcode ID: cc5522aa096706174fe5bff732e78697c4c6e57e60ae94610d03768685aaec63
                                                      • Instruction ID: 6d7d2e28d8c8822cc569d70d8e8d16e44964cec52c7ba4d3d41fcc4b245fff03
                                                      • Opcode Fuzzy Hash: cc5522aa096706174fe5bff732e78697c4c6e57e60ae94610d03768685aaec63
                                                      • Instruction Fuzzy Hash: 88218375BC0305BBEB24CFA0DD4AFDB3778AB48B00F205464FB41EA1C0C6B999109B69
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00433673,?), ref: 00433504
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,00433673,?), ref: 0043351C
                                                      • CryptStringToBinaryA.CRYPT32(s6C,00000000,00000001,00000000,?,00000000,00000000), ref: 00433535
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00433673,?), ref: 0043354C
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00433673,?), ref: 00433561
                                                      • wsprintfW.USER32 ref: 00433587
                                                      • wsprintfW.USER32 ref: 00433597
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00433673,?), ref: 004335A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$wsprintf$BinaryCryptFreeStringlstrlen
                                                      • String ID: s6C
                                                      • API String ID: 2885909284-3477048900
                                                      • Opcode ID: 8318c37a17a5c5fe56e1cc474ffb619b23a047d775bcf52a0ab2c2d4f17650ce
                                                      • Instruction ID: 8a6002ad0cfeb5cd94c8101aac161a66623eb1b27cf9c0d69dce74bc698e6803
                                                      • Opcode Fuzzy Hash: 8318c37a17a5c5fe56e1cc474ffb619b23a047d775bcf52a0ab2c2d4f17650ce
                                                      • Instruction Fuzzy Hash: 9B21A571A41318BFEB119F648C41F9BBFACEF49750F100065F644E72D0D6B55E108B99
                                                      APIs
                                                        • Part of subcall function 004382C0: InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004384A4
                                                        • Part of subcall function 004382C0: InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 004384BD
                                                      • VirtualAlloc.KERNEL32(00000000,00002801,00003000,00000040,756EF3C0,?), ref: 0043717F
                                                      • lstrlenW.KERNEL32(0043FFB4), ref: 0043718C
                                                        • Part of subcall function 004384D0: InternetCloseHandle.WININET(?), ref: 004384E3
                                                        • Part of subcall function 004384D0: InternetConnectW.WININET(?,00000000,00000050,00000000,00000000,00000003,00000000,00000000), ref: 00438502
                                                      • lstrlenA.KERNEL32(00000000,ipv4bot.whatismyipaddress.com,0043FFB8,00000000,00000000,00000000,000027FF,?,00000000), ref: 004371BB
                                                      • wsprintfW.USER32 ref: 004371D3
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,ipv4bot.whatismyipaddress.com,0043FFB8,00000000,00000000,00000000,000027FF,?,00000000), ref: 004371E9
                                                      • InternetCloseHandle.WININET(?), ref: 004371F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleOpenVirtuallstrlen$AllocConnectFreewsprintf
                                                      • String ID: GET$ipv4bot.whatismyipaddress.com
                                                      • API String ID: 4289327240-2259699238
                                                      • Opcode ID: 4c2a3969607ee640ffa78f5d447d68b7b7634abf872920277f7b75469356b936
                                                      • Instruction ID: e49d8e4db9504770c6e818353ada2229ad03a7ecce0d58d76e4ea1ab67923283
                                                      • Opcode Fuzzy Hash: 4c2a3969607ee640ffa78f5d447d68b7b7634abf872920277f7b75469356b936
                                                      • Instruction Fuzzy Hash: 8601D836B8021077DF206B669D4EF5B7E3CAB99B11F10103AFA45E11C0DE688919D6AE
                                                      APIs
                                                      • EnumDeviceDrivers.PSAPI(?,00000004,?), ref: 00432F74
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00432F8D
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocDeviceDriversEnumVirtual
                                                      • String ID:
                                                      • API String ID: 4140748134-0
                                                      • Opcode ID: bbaec4300c439773b8d015a901dc51f26042c503698d0e00c501af714f8eb26f
                                                      • Instruction ID: 017289b7111aad03095c2dda45e622744453d622ad93bbae8a249e0e99ae8930
                                                      • Opcode Fuzzy Hash: bbaec4300c439773b8d015a901dc51f26042c503698d0e00c501af714f8eb26f
                                                      • Instruction Fuzzy Hash: 9D210A32640118BBEB10CF98DD41FEA77BCEB08714F0001A7FE44D2180D7B59915AB95
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004384A4
                                                      • InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 004384BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InternetOpen
                                                      • String ID: $ $ $ $ $($)$.$.$0$1$3$3$3$5$5$5$5$6$6$7$7$8$8$A$G$K$K$L$M$O$T$T$a$a$a$c$d$e$e$e$e$h$i$i$i$l$o$o$p$t$w$z
                                                      • API String ID: 2038078732-3622400399
                                                      • Opcode ID: f5435782f192dd437789189a76dad48bbc1b5d78f8784f006b3c7a9fc9f47e6e
                                                      • Instruction ID: b9cf64c6504292ca68169b652b7d57b02b7815e932c5476c4f4d83df9d59a15b
                                                      • Opcode Fuzzy Hash: f5435782f192dd437789189a76dad48bbc1b5d78f8784f006b3c7a9fc9f47e6e
                                                      • Instruction Fuzzy Hash: 7D41A8B4811368DEEB25CF91999879EBFF5BB04748F50819ED5086B201C7F60A89CF64
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00434A42
                                                      • VirtualAlloc.KERNEL32(00000000,0000022C,00003000,00000004), ref: 00434A5C
                                                      • Process32FirstW.KERNEL32(00000000,00000000), ref: 00434A75
                                                      • lstrcmpiW.KERNEL32(00000002,00000024), ref: 00434A95
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00434AA5
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00434AB4
                                                      • CloseHandle.KERNEL32(00000000), ref: 00434AC1
                                                      • Process32NextW.KERNEL32(?,00000000), ref: 00434ADA
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00434AF3
                                                      • CloseHandle.KERNEL32(?), ref: 00434AFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcessProcess32Virtual$AllocCreateFirstFreeNextOpenSnapshotTerminateToolhelp32lstrcmpi
                                                      • String ID: agntsvc.exeagntsvc.exe$agntsvc.exeencsvc.exe$agntsvc.exeisqlplussvc.exe$dbeng50.exe$dbsnmp.exe$excel.exe$firefoxconfig.exe$infopath.exe$msaccess.exe$msftesql.exe$mspub.exe$mydesktopqos.exe$mydesktopservice.exe$mysqld-nt.exe$mysqld-opt.exe$mysqld.exe$ocautoupds.exe$ocomm.exe$ocssd.exe$onenote.exe$oracle.exe$outlook.exe$powerpnt.exe$sqbcoreservice.exe$sqlagent.exe$sqlbrowser.exe$sqlservr.exe$sqlwriter.exe$steam.exe$synctime.exe$tbirdconfig.exe$thebat.exe$thebat64.exe$thunderbird.exe$visio.exe$winword.exe$wordpad.exe$xfssvccon.exe
                                                      • API String ID: 3586910739-2697476765
                                                      • Opcode ID: 4d7ee9e4de71bdc0425fccf302184aa7262f0c41c139441d03b8e52cfa931fa4
                                                      • Instruction ID: 5e5e87f45280335569a4c58fe6e0773d0e9aa3705455475bc36201c6da4238fc
                                                      • Opcode Fuzzy Hash: 4d7ee9e4de71bdc0425fccf302184aa7262f0c41c139441d03b8e52cfa931fa4
                                                      • Instruction Fuzzy Hash: 53516FB18483809FD7209F50994D74BBBF4BB99318F10E92EE5985A260C7B8980DCF5F
                                                      APIs
                                                        • Part of subcall function 00433D00: _memset.LIBCMT ref: 00433D52
                                                        • Part of subcall function 00433D00: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00433D76
                                                        • Part of subcall function 00433D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00433D7A
                                                        • Part of subcall function 00433D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00433D7E
                                                        • Part of subcall function 00433D00: VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00433DA5
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000040), ref: 0043477F
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000100), ref: 00434795
                                                      • lstrcatW.KERNEL32(00000000,0063005C), ref: 0043479D
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,?,00000000,00000000), ref: 004347B3
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004347C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$Virtual$AllocDirectoryExecuteFreeInfoShellSystemVerifyVersion_memsetlstrcat
                                                      • String ID: $ $ $ $.$.$/$/$\$\$a$a$a$b$c$d$d$e$e$e$e$h$i$l$l$m$m$m$n$o$open$p$s$s$t$u$w$w$x$x
                                                      • API String ID: 2684037697-4098772853
                                                      • Opcode ID: 882c6864745679a9344f0147b9335992b95e8697f65f2e3d8f04cd83bca2b763
                                                      • Instruction ID: d6a0ed6731b8fbd9fed2d070f43b4628c2c0033e30d8563d6f94286ad6db5c07
                                                      • Opcode Fuzzy Hash: 882c6864745679a9344f0147b9335992b95e8697f65f2e3d8f04cd83bca2b763
                                                      • Instruction Fuzzy Hash: AE4118B0148380DFE3208F119849B5BBFE6BBC5B49F10591DE6985A291C7F6854CCF9B
                                                      APIs
                                                        • Part of subcall function 00433D00: _memset.LIBCMT ref: 00433D52
                                                        • Part of subcall function 00433D00: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00433D76
                                                        • Part of subcall function 00433D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00433D7A
                                                        • Part of subcall function 00433D00: VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00433D7E
                                                        • Part of subcall function 00433D00: VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00433DA5
                                                        • Part of subcall function 00433C80: AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00433CB0
                                                      • ExpandEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00433E6D
                                                      • wsprintfW.USER32 ref: 00433F37
                                                      • VirtualAlloc.KERNEL32(00000000,0000003D,00003000,00000040), ref: 00433F4B
                                                      • GetForegroundWindow.USER32 ref: 00433F60
                                                      • ShellExecuteExW.SHELL32(00000000), ref: 00433FC1
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00433FD4
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00433FE6
                                                      • CloseHandle.KERNEL32(?), ref: 00433FEF
                                                      • ExitProcess.KERNEL32 ref: 00433FF7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$Virtual$AllocAllocateCloseEnvironmentExecuteExitExpandForegroundFreeHandleInfoInitializeObjectProcessShellSingleStringsVerifyVersionWaitWindow_memsetwsprintf
                                                      • String ID: $ $"$"$%$%$2$\$\$a$a$c$c$c$d$e$e$e$i$l$m$m$n$o$p$r$r$r$s$s$s$t$t$w$y
                                                      • API String ID: 561366689-3790645798
                                                      • Opcode ID: 86b379afd52061868de15862654c3f7b6bb3587191c417589402d1a451560b13
                                                      • Instruction ID: 9b5f52f4f4241ad75abfbba26bfacbf558d0cdd606acc89b6c9b377b119bf86b
                                                      • Opcode Fuzzy Hash: 86b379afd52061868de15862654c3f7b6bb3587191c417589402d1a451560b13
                                                      • Instruction Fuzzy Hash: 1C5158B0408340DFE3208F11D848B5ABFF9BF84749F005A2DE69886251C7FA9558CF9B
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(00000000,00000010,00000000,00000000), ref: 004337C4
                                                      • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 004337CF
                                                      • VirtualAlloc.KERNEL32(00000000,00000401,00003000,00000040,00000000,00000000,00000000,?), ref: 0043380A
                                                      • lstrcpyW.KERNEL32(00000000,00000000), ref: 00433828
                                                      • lstrcatW.KERNEL32(00000000,0043002E), ref: 00433833
                                                        • Part of subcall function 00438880: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 004388A0
                                                        • Part of subcall function 00438880: VirtualAlloc.KERNEL32(00000000,00000007,00003000,00000040), ref: 004388C8
                                                        • Part of subcall function 00438880: GetModuleHandleA.KERNEL32(?), ref: 0043891D
                                                        • Part of subcall function 00438880: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 0043892B
                                                        • Part of subcall function 00438880: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 0043893A
                                                        • Part of subcall function 00438880: CryptReleaseContext.ADVAPI32(?,00000000), ref: 0043895E
                                                        • Part of subcall function 00438880: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043896C
                                                        • Part of subcall function 00438880: CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0043292B), ref: 00438980
                                                        • Part of subcall function 00438880: VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,?,?,0043292B), ref: 0043898E
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000004), ref: 00433896
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000004), ref: 004338C1
                                                        • Part of subcall function 00436770: EnterCriticalSection.KERNEL32(00443058,?,004338F4,00000000,00000000,00000000,?,00000800), ref: 0043677B
                                                        • Part of subcall function 00436770: CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,F0000000,?,004338F4,00000000,00000000,00000000), ref: 004367A1
                                                        • Part of subcall function 00436770: GetLastError.KERNEL32(?,004338F4,00000000,00000000,00000000), ref: 004367AB
                                                        • Part of subcall function 00436770: CryptAcquireContextW.ADVAPI32(00000000,00000000,Microsoft Enhanced Cryptographic Provider v1.0,00000001,00000008,?,004338F4,00000000,00000000,00000000), ref: 004367C7
                                                        • Part of subcall function 00436770: LeaveCriticalSection.KERNEL32(00443058,?,004338F4,00000000,00000000,00000000), ref: 004367D6
                                                      • MessageBoxA.USER32(00000000,Fatal error: rsaenh.dll is not initialized as well,Fatal error,00000010), ref: 0043390F
                                                      • GetLastError.KERNEL32 ref: 00433933
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043398D
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00433999
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00433BB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$ContextCryptFree$Alloc$Acquire$AttributesCriticalErrorFileLastReleaseSection$AddressEnterHandleLeaveLibraryLoadMessageModuleProclstrcatlstrcpy
                                                      • String ID: $B$Fatal error$Fatal error: rsaenh.dll is not initialized as well$HlC$R
                                                      • API String ID: 3050744578-2265939489
                                                      • Opcode ID: 2d3ed79f63ef45b50a98205ba23161d5947854cda1477d5b2c749dba75acac1f
                                                      • Instruction ID: 78c39a9d5d7d20ac23f1014bfe9c64397cb7d27b976d10aa486426b8763edb96
                                                      • Opcode Fuzzy Hash: 2d3ed79f63ef45b50a98205ba23161d5947854cda1477d5b2c749dba75acac1f
                                                      • Instruction Fuzzy Hash: 8FC14C71E40308ABEB119F94DC46FEEBB78BF48704F205125F640BA2D0DBB56A548F69
                                                      APIs
                                                      • CreatePipe.KERNEL32(00443080,0044307C,?,00000000,00000001,00000001,00000000), ref: 0043518D
                                                      • SetHandleInformation.KERNEL32(00000001,00000000), ref: 004351B1
                                                      • CreatePipe.KERNEL32(00443078,00443084,0000000C,00000000), ref: 004351CA
                                                      • SetHandleInformation.KERNEL32(00000001,00000000), ref: 004351DA
                                                      • VirtualAlloc.KERNEL32(00000000,00002800,00003000,00000004), ref: 004351EE
                                                      • wsprintfW.USER32 ref: 004351FF
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00435220
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateHandleInformationPipeVirtual$AllocFreewsprintf
                                                      • String ID: $ $.$.$1$2$S$S$c$c$d$d$fabian wosar <3$l$l$m$m$n$n$n$n$n$n$o$o$o$o$u$u$u$u
                                                      • API String ID: 1490407255-1922363339
                                                      • Opcode ID: e7c69d60045268b9f05d83bc7c2ad988fc6ae3d86090c0ec4baa969ee5410494
                                                      • Instruction ID: b3010332d460fd0e518b59bfd3f3466eaf76b91192ee4a5185d4df0bec29d16b
                                                      • Opcode Fuzzy Hash: e7c69d60045268b9f05d83bc7c2ad988fc6ae3d86090c0ec4baa969ee5410494
                                                      • Instruction Fuzzy Hash: B9415070E40318ABEB209F90DC497DDBFB6FB04B19F104129E504AA285C7FA4999CF95
                                                      APIs
                                                        • Part of subcall function 00433BD0: GetProcessHeap.KERNEL32(?,?,00434817,00000000,?,00000000,00000000), ref: 00433C6C
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNEL32(00000000,00000202,00003000,00000004), ref: 00437627
                                                        • Part of subcall function 00437600: GetUserNameW.ADVAPI32(00000000,?), ref: 00437638
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000004), ref: 00437656
                                                        • Part of subcall function 00437600: GetComputerNameW.KERNEL32(00000000,0000001E), ref: 00437660
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNELBASE(00000000,00000080,00003000,00000004), ref: 00437680
                                                        • Part of subcall function 00437600: wsprintfW.USER32 ref: 004376C1
                                                        • Part of subcall function 00437600: VirtualAlloc.KERNEL32(00000000,00000080,00003000,00000004), ref: 004376DE
                                                        • Part of subcall function 00437600: RegOpenKeyExW.ADVAPI32(80000001,Control Panel\International,00000000,00020019,00000000), ref: 00437702
                                                        • Part of subcall function 00437600: RegQueryValueExW.ADVAPI32(?,LocaleName,00000000,00000000, HC,?), ref: 00437726
                                                        • Part of subcall function 00437600: RegCloseKey.ADVAPI32(?), ref: 00437742
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437462
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043746D
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437483
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043748E
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374A4
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374AF
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374C5
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(00434B46,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374D0
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374E6
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374F1
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437507
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437512
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437531
                                                        • Part of subcall function 00437410: lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043753C
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00434331
                                                      • lstrlenW.KERNEL32(ransom_id=,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00434373
                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004343F2
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004343F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$AllocVirtual$Name$CloseComputerHeapOpenProcessQueryUserValuelstrcpywsprintf
                                                      • String ID: -$.$.$/$/$a$a$c$d$d$h$h$j$l$m$n$n$o$o$r$r$r$ransom_id=$s$t$t$w$w$w$y${USERID}
                                                      • API String ID: 4100118565-2385900546
                                                      • Opcode ID: dc3ea8ce1bc2bf6067a6ac064b74af74e511cf7ce766b555a66a2855c16c52ed
                                                      • Instruction ID: eaf93eb9c7d446b3fdd658ccdc09af9b3f7f0a0b439959cf2a8634b9fde5dff5
                                                      • Opcode Fuzzy Hash: dc3ea8ce1bc2bf6067a6ac064b74af74e511cf7ce766b555a66a2855c16c52ed
                                                      • Instruction Fuzzy Hash: 5971F5705443409BE7209F10D8097ABBBE1FBD4748F10592DFA855B290DBF99948CB9A
                                                      APIs
                                                      • lstrcpyW.KERNEL32(00000000,00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004343F2
                                                      • lstrlenW.KERNEL32(00000000,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 004343F9
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004), ref: 00434565
                                                      • wsprintfW.USER32 ref: 0043457F
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00434596
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocFreelstrcpylstrlenwsprintf
                                                      • String ID: -$.$.$/$/$a$a$c$d$d$h$h$j$l$m$n$n$o$o$r$r$r$s$t$t$w$w$w$y${USERID}
                                                      • API String ID: 4033391921-3341315666
                                                      • Opcode ID: c881ab77689a790921297c3dec7ad02f99da38a102c9e7b9cb1818078590ecd8
                                                      • Instruction ID: 1e2e3d6369eac5a449523ad56354d5262b6e29078f9ed6beb34690da19a5defc
                                                      • Opcode Fuzzy Hash: c881ab77689a790921297c3dec7ad02f99da38a102c9e7b9cb1818078590ecd8
                                                      • Instruction Fuzzy Hash: 3F418DB0508340DBE7209F10D54836BBFE2FBD5B4CF10992DE6840B261D7FA8589CB5A
                                                      APIs
                                                      • lstrlenW.KERNEL32(00520050,00000041,7572F770,00000000), ref: 0043299D
                                                        • Part of subcall function 00438730: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 0043874D
                                                        • Part of subcall function 00438730: VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 0043877B
                                                        • Part of subcall function 00438730: GetModuleHandleA.KERNEL32(?), ref: 004387CF
                                                        • Part of subcall function 00438730: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 004387DD
                                                        • Part of subcall function 00438730: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 004387EC
                                                        • Part of subcall function 00438730: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00438835
                                                        • Part of subcall function 00438730: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00438843
                                                      • RegCreateKeyExW.ADVAPI32(80000001,004F0053,00000000,00000000,00000000,000F003F,00000000,E,C,00000000), ref: 00432A84
                                                      • lstrlenW.KERNEL32(00000000), ref: 00432A8F
                                                      • RegSetValueExW.ADVAPI32(E,C,00520050,00000000,00000001,00000000,00000000), ref: 00432AA4
                                                      • RegCloseKey.ADVAPI32(?), ref: 00432AB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ContextCryptVirtuallstrlen$AcquireAddressAllocCloseCreateFreeHandleLibraryLoadModuleProcReleaseValue
                                                      • String ID: A$E,C$F$H$P$R$R$S$U$V$W$\$\$d$e$f$i$i$i$n$n$n$n$r$r$r$s$u$w
                                                      • API String ID: 553367697-2677956168
                                                      • Opcode ID: 344a5e7bf2300d1def5c531deeb54ca45d768d4adb6259c552854c39351c9888
                                                      • Instruction ID: 470aebfde6d98ebec646bba159710dd5e735060566eb55c4f8e7e2ed5aa41241
                                                      • Opcode Fuzzy Hash: 344a5e7bf2300d1def5c531deeb54ca45d768d4adb6259c552854c39351c9888
                                                      • Instruction Fuzzy Hash: 1A31ECB090021CDFEB20CF91E949BEDBFB9FB05709F108119E5186A291D7FA49488F99
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,756EF3C0,?,760773E0), ref: 00437CFD
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004), ref: 00437D71
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00437D86
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00437D9C
                                                      • Process32FirstW.KERNEL32(00000000,00000000), ref: 00437DBF
                                                      • lstrcmpiW.KERNEL32(004403D4,-00000024), ref: 00437DE5
                                                      • Process32NextW.KERNEL32(?,?), ref: 00437E5E
                                                      • GetLastError.KERNEL32 ref: 00437E68
                                                      • lstrlenW.KERNEL32(00000000), ref: 00437E86
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00437EAB
                                                      • CloseHandle.KERNEL32(?), ref: 00437EB0
                                                      • VirtualFree.KERNEL32(?,?,00008000), ref: 00437EC5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Free$AllocProcess32$CloseCreateErrorFirstHandleLastNextSnapshotToolhelp32lstrcmpilstrlen
                                                      • String ID: AVP.EXE$Mcshield.exe$NortonAntiBot.exe$ashDisp.exe$avengine.exe$avgnt.exe$cfp.exe$cmdagent.exe$ekrn.exe$fsguiexe.exe$msmpeng.exe$pccpfw.exe$persfw.exe$smc.exe
                                                      • API String ID: 2470459410-3383346926
                                                      • Opcode ID: 907fe4be3d88fc7a27cc45f1a529a07b9fdc9dc51069e723141aacfe753322ee
                                                      • Instruction ID: 21f5bfc5c54923c8d26755b124ebc3543c75c9281c914fa480a339de5fa49ee5
                                                      • Opcode Fuzzy Hash: 907fe4be3d88fc7a27cc45f1a529a07b9fdc9dc51069e723141aacfe753322ee
                                                      • Instruction Fuzzy Hash: AA518FB1944218ABDF20CF54DC49B9E7FB0FF49710F20906AEA44BB290C7785915CF59
                                                      APIs
                                                        • Part of subcall function 00432F50: EnumDeviceDrivers.PSAPI(?,00000004,?), ref: 00432F74
                                                      • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 00432E19
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00432E2E
                                                      • LoadIconW.USER32 ref: 00432E59
                                                      • RegisterClassExW.USER32(?), ref: 00432E68
                                                      • ExitThread.KERNEL32 ref: 00432E75
                                                        • Part of subcall function 00432F50: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00432F8D
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,00007F00), ref: 00432E7B
                                                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00007F00), ref: 00432E81
                                                      • CreateWindowExW.USER32(00000000,win32app,firefox,00CF0000,80000000,80000000,00000005,00000005,00000000,00000000,00000000), ref: 00432EA7
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00432EB4
                                                      • ExitThread.KERNEL32 ref: 00432EBF
                                                        • Part of subcall function 00432F50: EnumDeviceDrivers.PSAPI(00000000,00000000,?), ref: 00432FA8
                                                        • Part of subcall function 00432F50: GetDeviceDriverBaseNameW.PSAPI(00000000,?,00000400), ref: 00432FCF
                                                        • Part of subcall function 00432F50: lstrcmpiW.KERNEL32(?,006C006B), ref: 00432FE3
                                                        • Part of subcall function 00432F50: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00432FFA
                                                      • ExitThread.KERNEL32 ref: 00432F3F
                                                        • Part of subcall function 00432AD0: VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000040), ref: 00432AEA
                                                        • Part of subcall function 00432AD0: GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00432B2C
                                                        • Part of subcall function 00432AD0: GetTempPathW.KERNEL32(00000100,00000000), ref: 00432B38
                                                        • Part of subcall function 00432AD0: ExitThread.KERNEL32 ref: 00432C47
                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,00007F00), ref: 00432EC8
                                                      • UpdateWindow.USER32(00000000), ref: 00432ECF
                                                      • CreateThread.KERNEL32(00000000,00000000,00432D10,00000000,00000000,00000000), ref: 00432EE3
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00007F00), ref: 00432EEE
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00432F05
                                                      • TranslateMessage.USER32(?), ref: 00432F1C
                                                      • DispatchMessageW.USER32(?), ref: 00432F23
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00432F37
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$ExitHandleMessageModuleWindow$DeviceVirtual$AllocCreateDriversEnumLoadName$BaseClassCloseCursorDispatchDriverFileFreeIconLongPathRegisterShowTempTranslateUpdatelstrcmpi
                                                      • String ID: 0$1$d$f$firefox$k$s$s$s$s$w$win32app
                                                      • API String ID: 3011903443-520298170
                                                      • Opcode ID: a7f6df4a2dc23f927ed558311fd1b35bf0aa5f1664acf62d7c9328f13858d450
                                                      • Instruction ID: d93f4eff1973f675b1e5fa90de6dbea89ed3966c69e3e629692535ee166bef6a
                                                      • Opcode Fuzzy Hash: a7f6df4a2dc23f927ed558311fd1b35bf0aa5f1664acf62d7c9328f13858d450
                                                      • Instruction Fuzzy Hash: 4D518D70588301AFE7109F618D0DB5B7BE4AF48B48F10592DF684A62D0E7F89509CF9E
                                                      APIs
                                                      • InternetCloseHandle.WININET(?), ref: 004384E3
                                                      • InternetConnectW.WININET(?,00000000,00000050,00000000,00000000,00000003,00000000,00000000), ref: 00438502
                                                      • VirtualAlloc.KERNEL32(00000000,00002800,00003000,00000040,?,?,?,?,?,?,?,004371B6,ipv4bot.whatismyipaddress.com,0043FFB8,00000000,00000000), ref: 0043852F
                                                      • wsprintfW.USER32 ref: 00438543
                                                      • HttpOpenRequestW.WININET(00000000,?,00000000,HTTP/1.1,00000000,00000000,8404F700,00000000), ref: 00438561
                                                      • HttpAddRequestHeadersW.WININET(00000000,006F0048,000000FF,00000000), ref: 004385C5
                                                      • HttpSendRequestW.WININET(00000000,00610072,0020003A,00000000,00740069), ref: 004385DC
                                                      • InternetReadFile.WININET(00000000,0062002E,00650071,00000000), ref: 004385FB
                                                      • InternetReadFile.WININET(00000000,0062002E,00650071,00000000), ref: 00438625
                                                      • GetLastError.KERNEL32 ref: 00438631
                                                      • InternetCloseHandle.WININET(00000000), ref: 0043863E
                                                      • InternetCloseHandle.WININET(00000000), ref: 00438643
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,004371B6,ipv4bot.whatismyipaddress.com,0043FFB8), ref: 0043864F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleHttpRequest$FileReadVirtual$AllocConnectErrorFreeHeadersLastOpenSendwsprintf
                                                      • String ID: .$:$H$HTTP/1.1$i$n$o$r$r$s$w
                                                      • API String ID: 3906118045-693250572
                                                      • Opcode ID: dd2016aa39268b1cb5046943caa02f765b3e1ccfa00a4b4b03db7db2211b0af2
                                                      • Instruction ID: e5aa43513ad30d5dc965f3c371dee854e9e03f4b7e0c35d277b5fecd2601b40c
                                                      • Opcode Fuzzy Hash: dd2016aa39268b1cb5046943caa02f765b3e1ccfa00a4b4b03db7db2211b0af2
                                                      • Instruction Fuzzy Hash: 3641A731640308BFEF108F54DC49F9EBFB8EF18754F105129F944A62A0CBB59951CBA9
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,00000000,00000000,00000000), ref: 004352AD
                                                      • Sleep.KERNEL32(000003E8), ref: 004352F0
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 004352FE
                                                      • VirtualAlloc.KERNEL32(00000000,00000000), ref: 0043530E
                                                      • lstrcmpiA.KERNEL32(00000000,fabian wosar <3), ref: 0043532A
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043533B
                                                      • wsprintfW.USER32 ref: 00435353
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00435364
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocFree$Sleeplstrcmpilstrlenwsprintf
                                                      • String ID: >UC$alar$fabian wosar <3$it$m.bi$omwa$rans$re.b$t$zone
                                                      • API String ID: 2709691373-1154720078
                                                      • Opcode ID: 3d984b5fb75fe20ce2f6f9a2f8717c6103d2f374e3b03693684e56d843308e3c
                                                      • Instruction ID: d9ad50283f7951e700c6d988a95cd40867bb62399bb33fd00eee785fe144719f
                                                      • Opcode Fuzzy Hash: 3d984b5fb75fe20ce2f6f9a2f8717c6103d2f374e3b03693684e56d843308e3c
                                                      • Instruction Fuzzy Hash: F031D470E40318ABDB108FA5DD86BDF7B78FF48714F101129FA56A72D0D7745A048B99
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000010,00000000,00000000,00436C13), ref: 00436A1C
                                                      • lstrlenW.KERNEL32(00000000), ref: 00436A21
                                                      • lstrcmpiW.KERNEL32(-00000004,desktop.ini), ref: 00436A4D
                                                      • lstrcmpiW.KERNEL32(-00000004,autorun.inf), ref: 00436A62
                                                      • lstrcmpiW.KERNEL32(-00000004,ntuser.dat), ref: 00436A6E
                                                      • lstrcmpiW.KERNEL32(-00000004,iconcache.db), ref: 00436A7A
                                                      • lstrcmpiW.KERNEL32(-00000004,bootsect.bak), ref: 00436A86
                                                      • lstrcmpiW.KERNEL32(-00000004,boot.ini), ref: 00436A92
                                                      • lstrcmpiW.KERNEL32(-00000004,ntuser.dat.log), ref: 00436A9E
                                                      • lstrcmpiW.KERNEL32(-00000004,thumbs.db), ref: 00436AAA
                                                      • lstrcmpiW.KERNEL32(-00000004,CRAB-DECRYPT.txt), ref: 00436AB6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmpi$lstrlen
                                                      • String ID: CRAB-DECRYPT.txt$autorun.inf$boot.ini$bootsect.bak$desktop.ini$iconcache.db$ntuser.dat$ntuser.dat.log$thumbs.db
                                                      • API String ID: 203586893-3936223242
                                                      • Opcode ID: d8b802445c24f7228b4d904a495d52eb0d09b8f81101daf585fb8664f1ec4cf7
                                                      • Instruction ID: 78ffe90bb258a4a406e6577737e6cf1fae83e21db137853e0a75311ec7d832a1
                                                      • Opcode Fuzzy Hash: d8b802445c24f7228b4d904a495d52eb0d09b8f81101daf585fb8664f1ec4cf7
                                                      • Instruction Fuzzy Hash: 8311C153A40627355B20B22D9C02EAF528C4D9AB44B26F137EA40F2191EB8DCA0A48BD
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000800,00003000,00000040), ref: 00432AEA
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100), ref: 00432B2C
                                                      • GetTempPathW.KERNEL32(00000100,00000000), ref: 00432B38
                                                      • lstrlenW.KERNEL32(?,?,?,00000052), ref: 00432B7D
                                                        • Part of subcall function 00438730: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000000,00000000,00000000,00000000), ref: 0043874D
                                                        • Part of subcall function 00438730: VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 0043877B
                                                        • Part of subcall function 00438730: GetModuleHandleA.KERNEL32(?), ref: 004387CF
                                                        • Part of subcall function 00438730: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 004387DD
                                                        • Part of subcall function 00438730: GetProcAddress.KERNEL32(00000000,CryptGenRandomAdvapi32.dll), ref: 004387EC
                                                        • Part of subcall function 00438730: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00438835
                                                        • Part of subcall function 00438730: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00438843
                                                      • GetEnvironmentVariableW.KERNEL32(AppData,00000000,00000100), ref: 00432B9C
                                                      • lstrcatW.KERNEL32(00000000,\Microsoft\), ref: 00432BE4
                                                      • lstrcatW.KERNEL32(00000000,?), ref: 00432BEC
                                                      • lstrcatW.KERNEL32(00000000,.exe), ref: 00432BF4
                                                      • wsprintfW.USER32 ref: 00432C35
                                                      • ExitThread.KERNEL32 ref: 00432C47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtuallstrcat$AllocContextCryptModule$AcquireAddressEnvironmentExitFileFreeHandleLibraryLoadNamePathProcReleaseTempThreadVariablelstrlenwsprintf
                                                      • String ID: "%s"$.exe$AppData$P$U$\Microsoft\
                                                      • API String ID: 139215849-3336992450
                                                      • Opcode ID: 91bd475c89ae23db74182cbaf97d9b25f207f30ef77e02a9dab1f4d07504185c
                                                      • Instruction ID: 745a86427e57d0d4247636b9e84c9387b075cc942c17185dad63814034fb14fb
                                                      • Opcode Fuzzy Hash: 91bd475c89ae23db74182cbaf97d9b25f207f30ef77e02a9dab1f4d07504185c
                                                      • Instruction Fuzzy Hash: A441D6702443109BE704DF219D49B5F7798AF88704F14242DF595962D2DBBCE908CBAF
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000201,00003000,00000040,00000000,?,?,00000000,?,00436F26,00000000,?,?), ref: 004368BC
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,00000000,?,00436F26,00000000,?,?), ref: 00436914
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000002A,00000000,?,?,00000000,?,00436F26,00000000,?,?), ref: 0043697E
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000002B,00000000,?,?,00000000,?,00436F26,00000000,?,?), ref: 004369A6
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000024,00000000,?,?,00000000,?,00436F26,00000000,?,?), ref: 004369C4
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,0000001C,00000000,?,?,00000000,?,00436F26,00000000,?,?), ref: 004369E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FolderPathSpecial$Virtual$AllocFree
                                                      • String ID: Ransomware$\All Users\$\Boot\$\IETldCache\$\Local Settings\$\Program Files\$\ProgramData\$\Tor Browser\$\Windows\
                                                      • API String ID: 4167578076-3735464813
                                                      • Opcode ID: d1bac45d3d3c41822532f29447c0d7f8e83347de179588fd6383f2149c4f38c8
                                                      • Instruction ID: 4afd902d3260fa9aa3b89a15de715c0bf047bcaacd1e603cb7c9486f09b94e50
                                                      • Opcode Fuzzy Hash: d1bac45d3d3c41822532f29447c0d7f8e83347de179588fd6383f2149c4f38c8
                                                      • Instruction Fuzzy Hash: 1931486074071673EA2026664D16B2F61998F9CB48F11E02FFA45DA3C5EFBCCD0652DE
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00438139
                                                        • Part of subcall function 00437FB0: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 0043809A
                                                        • Part of subcall function 00437FB0: lstrcatW.KERNEL32(00000000,00440584), ref: 00438115
                                                      • lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 0043818F
                                                      • VirtualAlloc.KERNEL32(00000000,00000000), ref: 004381A1
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 004381B1
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004381BB
                                                      • lstrcatW.KERNEL32(00000000,00440604), ref: 004381D1
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 0043822C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043823A
                                                      • lstrcatW.KERNEL32(00000000,0043FFF8), ref: 00438280
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00438288
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00438296
                                                      • lstrcatW.KERNEL32(00000000,0043FFFC), ref: 004382A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtual$Free$Alloc$CountTicklstrlen
                                                      • String ID: VUUU$VUUU
                                                      • API String ID: 2785072370-3149182767
                                                      • Opcode ID: 03950ac9859dcd4c5f87cc328963fe3bb845fbab46a4fe0e2a2bedf55cf3f488
                                                      • Instruction ID: 17740e1e5f42281a031850258f83e19106ded149a67980f978a015d31ca1c0e1
                                                      • Opcode Fuzzy Hash: 03950ac9859dcd4c5f87cc328963fe3bb845fbab46a4fe0e2a2bedf55cf3f488
                                                      • Instruction Fuzzy Hash: AE312E72E442009BD71C9B29CD4EF3DB7ACEB54711F14143EF952DB292CE78A9148A5C
                                                      APIs
                                                        • Part of subcall function 004382C0: InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004384A4
                                                        • Part of subcall function 004382C0: InternetOpenW.WININET(006F004D,00000001,00000000,00000000,10000000), ref: 004384BD
                                                        • Part of subcall function 00435250: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,00000000,00000000,00000000), ref: 004352AD
                                                        • Part of subcall function 00435250: Sleep.KERNEL32(000003E8), ref: 004352F0
                                                        • Part of subcall function 00435250: lstrlenW.KERNEL32(00000000,00003000,00000004), ref: 004352FE
                                                        • Part of subcall function 00435250: VirtualAlloc.KERNEL32(00000000,00000000), ref: 0043530E
                                                        • Part of subcall function 00435250: lstrcmpiA.KERNEL32(00000000,fabian wosar <3), ref: 0043532A
                                                        • Part of subcall function 00435250: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043533B
                                                        • Part of subcall function 00435250: wsprintfW.USER32 ref: 00435353
                                                        • Part of subcall function 00435250: VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00435364
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00435542
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040), ref: 00435562
                                                      • VirtualAlloc.KERNEL32(00000000,00032001,00003000,00000040), ref: 00435574
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0043558E
                                                      • lstrlenA.KERNEL32(00000000), ref: 004355E3
                                                      • lstrlenW.KERNEL32(?), ref: 004355EF
                                                      • lstrlenA.KERNEL32(00000000,00000000,00031FFF,?,00000000), ref: 0043560B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00000000,00000000,?,00000000), ref: 00435665
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 00435671
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000), ref: 0043567B
                                                      • InternetCloseHandle.WININET(zXC), ref: 00435685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Freelstrlen$Alloc$Internet$Open$CloseHandleSleeplstrcatlstrcmpiwsprintf
                                                      • String ID: POST$zXC
                                                      • API String ID: 2554059081-776939764
                                                      • Opcode ID: 0a27d543ec4beb162de6a7039b4199c249ab42d93e7e282031abadcbb6bbcb07
                                                      • Instruction ID: e456c8c5458e3ee5957e9004bd95e2526e6a02c26f51314b62012fa304cd8f34
                                                      • Opcode Fuzzy Hash: 0a27d543ec4beb162de6a7039b4199c249ab42d93e7e282031abadcbb6bbcb07
                                                      • Instruction Fuzzy Hash: A041B571E40709AAEB109FA5CC45FEEBB78FF48740F101526FA44B6250DB786A44CB98
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437462
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043746D
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437483
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043748E
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374A4
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374AF
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374C5
                                                      • lstrlenW.KERNEL32(00434B46,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374D0
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374E6
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 004374F1
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437507
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437512
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437531
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 0043753C
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437558
                                                      • lstrlenW.KERNEL32(?,?,?,?,00434829,00000000,?,00000000,00000000,?,00000000), ref: 00437566
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID:
                                                      • API String ID: 1659193697-0
                                                      • Opcode ID: bf5fa2fd0d6cca2a9eda67e3161693eaa7679a46e38f3fbc57a008a789b832e0
                                                      • Instruction ID: 756e38c06ae182333eca88f50012fcbdd86800a81edbde6aa0795fb7086f6433
                                                      • Opcode Fuzzy Hash: bf5fa2fd0d6cca2a9eda67e3161693eaa7679a46e38f3fbc57a008a789b832e0
                                                      • Instruction Fuzzy Hash: 57415D72244611EFC7295FB8DE8C794BBB1BF08305F085535E49682A20D735E878DB89
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,0000000A,00003000,00000004,00000000,00000000), ref: 00436033
                                                      • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00436048
                                                      • GetProcAddress.KERNEL32(00000000,RtlComputeCrc32), ref: 00436059
                                                      • lstrlenA.KERNEL32(00000000), ref: 00436064
                                                      • wsprintfA.USER32 ref: 0043607C
                                                      • _memset.LIBCMT ref: 0043609B
                                                      • lstrlenA.KERNEL32(00000000), ref: 004360A4
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004360D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtuallstrlen$AddressAllocFreeHandleModuleProc_memsetwsprintf
                                                      • String ID: %Xeuropol$RtlComputeCrc32$ntdll.dll
                                                      • API String ID: 218840185-1387466253
                                                      • Opcode ID: 76f07a0b721a55472712ae53b556ed94bca62b96ef07e159992f0d308c0cf131
                                                      • Instruction ID: a44c90c39bf06958be9cb491e0ff7a8539133c6c6d876780fbb9a5275460dddf
                                                      • Opcode Fuzzy Hash: 76f07a0b721a55472712ae53b556ed94bca62b96ef07e159992f0d308c0cf131
                                                      • Instruction Fuzzy Hash: 75115B31E80208BBDB209B649C4AFAE7F78BB18701F201079F944E22D0EAB44D549B5A
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000402,00003000,00000040,00000000,?,?,00000000,?,00436F5F,00000000,?,?), ref: 00436E65
                                                      • wsprintfW.USER32 ref: 00436E73
                                                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000001,00000080,00000000,?,?), ref: 00436E8F
                                                      • GetLastError.KERNEL32(?,?), ref: 00436E9C
                                                      • lstrlenW.KERNEL32(?,?,00000000,?,?), ref: 00436EBE
                                                      • WriteFile.KERNEL32(00000000,00000000,?,?), ref: 00436ECE
                                                      • CloseHandle.KERNEL32(00000000,?,?), ref: 00436ED5
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?), ref: 00436EE8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileVirtual$AllocCloseCreateErrorFreeHandleLastWritelstrlenwsprintf
                                                      • String ID: %s\CRAB-DECRYPT.txt
                                                      • API String ID: 2985722263-2724392667
                                                      • Opcode ID: f0888c33d032f8c5b4d23d032432fe4df8b24df741000a13a7f6a2e5a5af05cb
                                                      • Instruction ID: c8139849b6c87ea7853aa124e8f7fa30baf67ad57316251052fb231d4584b046
                                                      • Opcode Fuzzy Hash: f0888c33d032f8c5b4d23d032432fe4df8b24df741000a13a7f6a2e5a5af05cb
                                                      • Instruction Fuzzy Hash: A60128353C0210BBF7200B34ED4FF6A366CEB19B15F201231FB41E51D0C7A86814966E
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,00000000,00000000,00435519,00000000,?,?,?,?,00435643,00000000,?,00000000), ref: 00435396
                                                      • VirtualAlloc.KERNEL32(00000000,00000400,00003000,00000004,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 004353A8
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000200,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 004353B8
                                                      • wsprintfW.USER32 ref: 004353C9
                                                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004353E3
                                                      • ExitProcess.KERNEL32 ref: 004353EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual$ExecuteExitFileModuleNameProcessShellwsprintf
                                                      • String ID: /c timeout -c 5 & del "%s" /f /q$cmd.exe$open
                                                      • API String ID: 4033023619-516011104
                                                      • Opcode ID: d30c03319386e80c933937ca9b1f101b1adf7b3d243cc145f021d9035b01c0e1
                                                      • Instruction ID: 414306c989d5aa166db415b1ce975528f63741c0940740366a83e0a414805315
                                                      • Opcode Fuzzy Hash: d30c03319386e80c933937ca9b1f101b1adf7b3d243cc145f021d9035b01c0e1
                                                      • Instruction Fuzzy Hash: 58F06572BC171033F53127645C0FF0B2D689B59F56F342026F748BE1D189E4681086EE
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(?,?,00434817,00000000,?,00000000,00000000), ref: 00433C6C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID: hdd$os_bit$os_major$pc_group$pc_keyb$pc_lang$pc_name$pc_user$ransom_id
                                                      • API String ID: 54951025-631784635
                                                      • Opcode ID: 613bf5c2de7dde7cb8bfd033b046fb26caf9131a16b1e566829a3c884dd12aa3
                                                      • Instruction ID: 484d0df4007d703fb63f4cd7b5e50c129f85b52dc76916036531c1117f7c203c
                                                      • Opcode Fuzzy Hash: 613bf5c2de7dde7cb8bfd033b046fb26caf9131a16b1e566829a3c884dd12aa3
                                                      • Instruction Fuzzy Hash: CC1110B4901B448FC760CF69C58468ABBF0BB08758F50A92EE99AD7B10D3B5F4488F48
                                                      APIs
                                                        • Part of subcall function 00437FB0: VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 0043809A
                                                        • Part of subcall function 00437FB0: lstrcatW.KERNEL32(00000000,00440584), ref: 00438115
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 0043822C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043823A
                                                      • lstrcatW.KERNEL32(00000000,0043FFF8), ref: 00438280
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 00438288
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00438296
                                                      • lstrcatW.KERNEL32(00000000,0043FFFC), ref: 004382A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$Virtual$Free$Alloc
                                                      • String ID: VUUU$VUUU
                                                      • API String ID: 418921519-3149182767
                                                      • Opcode ID: e0f1c325ce775947723f5c13252cd9321c0eaaf688ab4ccfc984a1e1d9c48b55
                                                      • Instruction ID: 27330f1ff92d89dff3550715608d712ad642f2e863cfc2c11b1951dc7ad05172
                                                      • Opcode Fuzzy Hash: e0f1c325ce775947723f5c13252cd9321c0eaaf688ab4ccfc984a1e1d9c48b55
                                                      • Instruction Fuzzy Hash: A5110432A442009BC71CEB2DDD4EB39B7A8F755705F04283EF593DB192CE38A1158B18
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000A00,00003000,00000004,756EE0B0,?), ref: 004335E9
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,00000100,756F0440), ref: 00433600
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00433616
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00433626
                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00433639
                                                      • ReadFile.KERNEL32(00000000,00000000,00000001,?,00000000), ref: 0043364C
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0043368D
                                                      • CloseHandle.KERNEL32(00000000), ref: 00433694
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004336A2
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileVirtual$AllocFree$CloseCreateHandleModuleNameReadSize
                                                      • String ID:
                                                      • API String ID: 2352497600-0
                                                      • Opcode ID: 616fa14d18456d50b5a2cf04ffe4941b41930ff7d4d002301a201671a8eb4143
                                                      • Instruction ID: 4b61e87bf15a1d7f180aee676d93f3c8abe81ed5ed55f71288a5cd8a2c180948
                                                      • Opcode Fuzzy Hash: 616fa14d18456d50b5a2cf04ffe4941b41930ff7d4d002301a201671a8eb4143
                                                      • Instruction Fuzzy Hash: DD21F9317803047BEB259FA49C8BFAE7B68EB49715F200069FB45A92C0C6B89A10875D
                                                      APIs
                                                      • lstrlenA.KERNEL32(tTC,00000000,?,tTC,?,004334BF,tTC,00000001,tTC,00000000,00000000,00000000,?,?,00435474,00000000), ref: 00433251
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,004334BF,tTC,00000001,tTC,00000000,00000000,00000000,?,?,00435474,00000000), ref: 0043325B
                                                      • HeapAlloc.KERNEL32(00000000,?,004334BF,tTC,00000001,tTC,00000000,00000000,00000000,?,?,00435474,00000000), ref: 00433262
                                                      • lstrlenA.KERNEL32(tTC,00000000,?,tTC,?,004334BF,tTC,00000001,tTC,00000000,00000000,00000000,?,?,00435474,00000000), ref: 00433273
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,004334BF,tTC,00000001,tTC,00000000,00000000,00000000,?,?,00435474,00000000), ref: 0043327D
                                                      • HeapAlloc.KERNEL32(00000000,?,004334BF,tTC,00000001,tTC,00000000,00000000,00000000,?,?,00435474,00000000), ref: 00433284
                                                      • lstrcpyA.KERNEL32(00000000,tTC,?,004334BF,tTC,00000001,tTC,00000000,00000000,00000000,?,?,00435474,00000000), ref: 00433293
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocProcesslstrlen$lstrcpy
                                                      • String ID: tTC$tTC
                                                      • API String ID: 511007297-1085092769
                                                      • Opcode ID: e93130d8e23041165ebabb033cf6f294cbaef2813b0733c1472953291e94166f
                                                      • Instruction ID: 3f576e58433450ff868980f03334413e8d194009c5c5b27ec63e5af226e95ef6
                                                      • Opcode Fuzzy Hash: e93130d8e23041165ebabb033cf6f294cbaef2813b0733c1472953291e94166f
                                                      • Instruction Fuzzy Hash: 4511E6304442846EEB200F68980C767BB58EF1A312F246097E8D5C7311C73D8D56876A
                                                      APIs
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437EF9
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F0B
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F1D
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F2F
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F41
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F53
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F65
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F77
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437F89
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000001,004348BA,?,00003000,00000040,00000000,?,00000000,00000000,?,00000000), ref: 00437FA1
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 01b8c508131d399be82b73d88b4a94d9f59a9416aac35fe58662302d78fac8e6
                                                      • Instruction ID: aa69f7b04cc3b78753be31256a9f3197917a2f6df8a88fcb3cfbced265fd2d9b
                                                      • Opcode Fuzzy Hash: 01b8c508131d399be82b73d88b4a94d9f59a9416aac35fe58662302d78fac8e6
                                                      • Instruction Fuzzy Hash: A721E230284B04AAE7765B15DC06F5676E1BF44B45F255839E2C1345F08BF97899DF0C
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000018,00003000,00000004), ref: 00434020
                                                      • GetTickCount.KERNEL32 ref: 00434045
                                                      • GetDriveTypeW.KERNEL32(?), ref: 0043406A
                                                      • CreateThread.KERNEL32(00000000,00000000,004370B0,?,00000000,00000000), ref: 004340A9
                                                      • WaitForMultipleObjects.KERNEL32(00000000,?), ref: 004340EB
                                                      • GetTickCount.KERNEL32 ref: 004340F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountTick$AllocCreateDriveMultipleObjectsThreadTypeVirtualWait
                                                      • String ID: ?:\
                                                      • API String ID: 458387131-2533537817
                                                      • Opcode ID: 3e55ec5f2ad4fb261965ba65a230fc51e118d148fc429921475b8de913a0d2ca
                                                      • Instruction ID: f115b0fdc591f54e61c5125b79e77d871aa6c3fa2a6c24f23318fa8ec13295e4
                                                      • Opcode Fuzzy Hash: 3e55ec5f2ad4fb261965ba65a230fc51e118d148fc429921475b8de913a0d2ca
                                                      • Instruction Fuzzy Hash: 595125709483009FD314CF18D988B5ABBF5FFC8324F505A2EEA8997360D775A944CB9A
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000401,00003000,00000040), ref: 004370C9
                                                      • wsprintfW.USER32 ref: 004370DE
                                                      • InitializeCriticalSection.KERNEL32(?), ref: 004370EC
                                                      • VirtualAlloc.KERNEL32 ref: 00437120
                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00000000,00009C40,00003000,00000004), ref: 0043714D
                                                      • ExitThread.KERNEL32 ref: 00437155
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$Alloc$CriticalExitFreeInitializeSectionThreadwsprintf
                                                      • String ID: %c:\
                                                      • API String ID: 2059066847-3142399695
                                                      • Opcode ID: e5b9adf75293e603e4a4bc0ce388c7b77790cfdeeef54cab3839585a59e458dd
                                                      • Instruction ID: b25a7487b0060cbb47b563ff4021bd5faa0198c4eb67cb0ed06ec9650fad0b36
                                                      • Opcode Fuzzy Hash: e5b9adf75293e603e4a4bc0ce388c7b77790cfdeeef54cab3839585a59e458dd
                                                      • Instruction Fuzzy Hash: C211D6B5184300BFE7109F54CC8AF163BB8AB44B21F104614FBA49E1D1D7B49514CBAF
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(00000000,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00433CB0
                                                      • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 00433CC3
                                                      • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 00433CCF
                                                      • FreeSid.ADVAPI32(?), ref: 00433CEA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressAllocateFreeHandleInitializeModuleProc
                                                      • String ID: :MC$CheckTokenMembership$advapi32.dll
                                                      • API String ID: 3309497720-3592135811
                                                      • Opcode ID: 380505c1b8e8faa85e7f2e29b19e7dd55223fcaaa862be92d19bcf4d39d827dc
                                                      • Instruction ID: 3cc87387e46c1904554e82e3ebd99d833887db64e789ec8678e8e99533c2855b
                                                      • Opcode Fuzzy Hash: 380505c1b8e8faa85e7f2e29b19e7dd55223fcaaa862be92d19bcf4d39d827dc
                                                      • Instruction Fuzzy Hash: E0F0FF35E80309BBDF10DFE4DC0AFAD7778EB04706F105595F905A6290E77456148B59
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,7572F770,00000000,?,?,00432C02), ref: 004328AB
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,00432C02), ref: 004328BA
                                                      • CreateFileMappingW.KERNEL32(00000000,00000000,-00000008,00000000,00000000,00000000,?,?,00432C02), ref: 004328E5
                                                      • CloseHandle.KERNEL32(00000000,?,?,00432C02), ref: 004328F3
                                                      • MapViewOfFile.KERNEL32(00000000,7572F771,00000000,00000000,00000000,?,?,00432C02), ref: 0043290A
                                                      • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,00432C02), ref: 00432942
                                                      • CloseHandle.KERNEL32(?,?,?,00432C02), ref: 00432951
                                                      • CloseHandle.KERNEL32(00000000,?,?,00432C02), ref: 00432954
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateView$MappingSizeUnmap
                                                      • String ID:
                                                      • API String ID: 265113797-0
                                                      • Opcode ID: 3254d48576f18db478868325316a639651472780a2d6adff18c79931693a5136
                                                      • Instruction ID: b5d5b4cb7974c10a8d0033a5b1ab38b7e41a6a6ed957fcce4ef6ed41b3173017
                                                      • Opcode Fuzzy Hash: 3254d48576f18db478868325316a639651472780a2d6adff18c79931693a5136
                                                      • Instruction Fuzzy Hash: 18216BB1A402187FD7106B749C8AF7F776CDB49369F00123AFC41E2280D6389D1145A5
                                                      APIs
                                                        • Part of subcall function 004332B0: lstrlenA.KERNEL32(?,00000000,?,tTC,?,?,004333F6,00000000,00000000,?,?,00435474,00000000), ref: 004332C5
                                                        • Part of subcall function 004332B0: lstrlenA.KERNEL32(?,?,004333F6,00000000,00000000,?,?,00435474,00000000,?,?,?,?,00435643,00000000,?), ref: 004332EE
                                                      • lstrlenA.KERNEL32(tTC,tTC,00000000,00000000,00000000,?,?,00435474,00000000,?,?,?,?,00435643,00000000,?), ref: 00433484
                                                      • GetProcessHeap.KERNEL32(00000008,00000001,?,00435474,00000000,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 0043348E
                                                      • HeapAlloc.KERNEL32(00000000,?,00435474,00000000,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 00433495
                                                      • lstrcpyA.KERNEL32(00000000,tTC,?,00435474,00000000,?,?,?,?,00435643,00000000,?,00000000,00000000,?,00000000), ref: 004334A7
                                                      • ExitProcess.KERNEL32 ref: 004334DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$HeapProcess$AllocExitlstrcpy
                                                      • String ID: tTC
                                                      • API String ID: 1867342102-2646315492
                                                      • Opcode ID: 9fae79e1900f2d882af031b6dbdabae6ebee665c4b64686b8f3b1ace0ad1dacc
                                                      • Instruction ID: 5154140b53bf1b1bac9fbf124732a4115d9350d6d01d2b15530a9fbd8b651ec3
                                                      • Opcode Fuzzy Hash: 9fae79e1900f2d882af031b6dbdabae6ebee665c4b64686b8f3b1ace0ad1dacc
                                                      • Instruction Fuzzy Hash: 133136305042455AEF224F6888447B77B989B2E312F18719BE8D5CB381D67E8E4787AD
                                                      APIs
                                                      • lstrlenW.KERNEL32(00000000,00000010,00000000,00000000,?,00436BFA), ref: 00436AF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: %s
                                                      • API String ID: 1659193697-4273690596
                                                      • Opcode ID: 3f35c471cbb4abc3c7c44d2ff268614904513865b6fbe0b92a7e03cc8838182a
                                                      • Instruction ID: 48a4d284fe619d5a9bbc8a8d416797cebbaa865b4fee0f59e4c35e7026c79cd3
                                                      • Opcode Fuzzy Hash: 3f35c471cbb4abc3c7c44d2ff268614904513865b6fbe0b92a7e03cc8838182a
                                                      • Instruction Fuzzy Hash: B521F672A00236A7DB305F589C017B7B3E8EB99325F069227ED45D7284E7B86D41CA98
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 00432C8A
                                                      • BeginPaint.USER32(?,?), ref: 00432C9F
                                                      • lstrlenW.KERNEL32(?), ref: 00432CAC
                                                      • TextOutW.GDI32(00000000,00000005,00000005,?,00000000), ref: 00432CBD
                                                      • EndPaint.USER32(?,?), ref: 00432CCB
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00002AD0,00000000,00000000,00000000), ref: 00432CE9
                                                      • DestroyWindow.USER32(?), ref: 00432CF2
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PaintWindow$BeginCreateDestroyProcTextThreadlstrlen
                                                      • String ID:
                                                      • API String ID: 572880375-0
                                                      • Opcode ID: 2553cd1b62c3c8ca0d85b9bed10fe4aaf8a4a440eedfedc2dcb665e00cda962c
                                                      • Instruction ID: 688903e592a9abc176364ccd2b8542b89120258406cb9d3450c9c9a264996639
                                                      • Opcode Fuzzy Hash: 2553cd1b62c3c8ca0d85b9bed10fe4aaf8a4a440eedfedc2dcb665e00cda962c
                                                      • Instruction Fuzzy Hash: 4011C432544308AFD711DF68ED09FAB7BACFB48311F001626FD81D61A0E7B19924DB9A
                                                      APIs
                                                      • _memset.LIBCMT ref: 00434E39
                                                      • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,?,?,?,?,00000000), ref: 00434E7F
                                                      • GetLastError.KERNEL32(?,?,00000000), ref: 00434E89
                                                      • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00434E9D
                                                      • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00434EA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$CreateErrorLastProcess_memset
                                                      • String ID: D
                                                      • API String ID: 1393943095-2746444292
                                                      • Opcode ID: a30d77947f34d4bdcb865273184351df15e0f5a4a45aee8b391ed34b0e51d9d1
                                                      • Instruction ID: 433688588b4629fc69bcbe03884571d0f4b30c3e063efe24d40815aba85d47fa
                                                      • Opcode Fuzzy Hash: a30d77947f34d4bdcb865273184351df15e0f5a4a45aee8b391ed34b0e51d9d1
                                                      • Instruction Fuzzy Hash: 36014871E40318ABDB20DFA4DC46BDE7BB8EF09714F100226FA48F6190E7B555548B99
                                                      APIs
                                                      • lstrcmpiW.KERNEL32(00000002,00000024), ref: 00434A95
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00434AA5
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00434AB4
                                                      • CloseHandle.KERNEL32(00000000), ref: 00434AC1
                                                      • Process32NextW.KERNEL32(?,00000000), ref: 00434ADA
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00434AF3
                                                      • CloseHandle.KERNEL32(?), ref: 00434AFA
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess$FreeNextOpenProcess32TerminateVirtuallstrcmpi
                                                      • String ID:
                                                      • API String ID: 999196985-0
                                                      • Opcode ID: 01b9d6923e309ea0a12757cd293c1d388896e487bd28c66f3657fae3921ac6c8
                                                      • Instruction ID: c0a474c44ef89eb1154cdd24df0b66bc8768c65ee06be6295120578c4ff61d03
                                                      • Opcode Fuzzy Hash: 01b9d6923e309ea0a12757cd293c1d388896e487bd28c66f3657fae3921ac6c8
                                                      • Instruction Fuzzy Hash: A601D6322C0110ABDB10AF50AC88BAA77ACEBD9701F256125FA49D6150EB64AC158B6E
                                                      APIs
                                                      • __init_pointers.LIBCMT ref: 00FD1A4C
                                                        • Part of subcall function 00FD1BFB: EncodePointer.KERNEL32(00000000,?,00FD1A51,00FD12AD,00FDFD50,00000014), ref: 00FD1BFE
                                                        • Part of subcall function 00FD1BFB: __initp_misc_winsig.LIBCMT ref: 00FD1C19
                                                        • Part of subcall function 00FD1BFB: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FD2EA5
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00FD2EB9
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00FD2ECC
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00FD2EDF
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00FD2EF2
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00FD2F05
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00FD2F18
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00FD2F2B
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00FD2F3E
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00FD2F51
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00FD2F64
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00FD2F77
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00FD2F8A
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00FD2F9D
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00FD2FB0
                                                        • Part of subcall function 00FD1BFB: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00FD2FC3
                                                      • __mtinitlocks.LIBCMT ref: 00FD1A51
                                                      • __mtterm.LIBCMT ref: 00FD1A5A
                                                        • Part of subcall function 00FD1AC2: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00FD1A5F,00FD12AD,00FDFD50,00000014), ref: 00FD31BB
                                                        • Part of subcall function 00FD1AC2: _free.LIBCMT ref: 00FD31C2
                                                        • Part of subcall function 00FD1AC2: DeleteCriticalSection.KERNEL32(00FE1068,?,?,00FD1A5F,00FD12AD,00FDFD50,00000014), ref: 00FD31E4
                                                      • __calloc_crt.LIBCMT ref: 00FD1A7F
                                                      • __initptd.LIBCMT ref: 00FD1AA1
                                                      • GetCurrentThreadId.KERNEL32 ref: 00FD1AA8
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                      • String ID:
                                                      • API String ID: 3567560977-0
                                                      • Opcode ID: 6405ccc4a814573800a549d28fc162e67e54cf06079e9764ed0cd3e68d9e56bb
                                                      • Instruction ID: ee18717636b055cfe61792edee5497ce39623e6580926d584108df8498c16d0c
                                                      • Opcode Fuzzy Hash: 6405ccc4a814573800a549d28fc162e67e54cf06079e9764ed0cd3e68d9e56bb
                                                      • Instruction Fuzzy Hash: 06F06D32A1A65129E224BB747C0364A3797BB01771B2C061BF650D93D5FE288541B191
                                                      APIs
                                                      • lstrcmpiA.KERNEL32(tTC,mask), ref: 004331B9
                                                      • lstrcmpiA.KERNEL32(tTC,pub_key), ref: 004331D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmpi
                                                      • String ID: mask$pub_key$tTC$tTC
                                                      • API String ID: 1586166983-4235709636
                                                      • Opcode ID: c63e22b0836094a3d6225de8c323bb73b2bc4b41921f35e7be9afbaf91ceb528
                                                      • Instruction ID: 7b9947308841e26b6cab1d0c2403791ad88d96065e90503b74eb10f4218bddb5
                                                      • Opcode Fuzzy Hash: c63e22b0836094a3d6225de8c323bb73b2bc4b41921f35e7be9afbaf91ceb528
                                                      • Instruction Fuzzy Hash: D5F08B723482845EFB194E6C9C457A3BBCC9B19311F5821BFF6CAC2290C6AE8C81C35D
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000100,00003000,00000004,?,00000003), ref: 0043809A
                                                      • lstrcatW.KERNEL32(00000000,00440584), ref: 00438115
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtuallstrcat
                                                      • String ID: eigh$ere$ore
                                                      • API String ID: 3624338217-3418171569
                                                      • Opcode ID: 7083aa887dfd6e6a7c5c6fd3a279a3089482fbc24b335b94be0748881075152c
                                                      • Instruction ID: 9562c19b8a6c338addea57ed2e41c946ff502cc89c6260b849b4e14cd7b3e2be
                                                      • Opcode Fuzzy Hash: 7083aa887dfd6e6a7c5c6fd3a279a3089482fbc24b335b94be0748881075152c
                                                      • Instruction Fuzzy Hash: C23138B1D11758ABEB14CF85D84869DBFF4EB44708F20961EE6146B240CBBC9569CF8C
                                                      APIs
                                                      • _memset.LIBCMT ref: 00433D52
                                                      • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,00000000), ref: 00433D76
                                                      • VerSetConditionMask.KERNEL32(00000000,?,?,?,00000000), ref: 00433D7A
                                                      • VerSetConditionMask.KERNEL32(00000000,?,?,?,?,00000000), ref: 00433D7E
                                                      • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00433DA5
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConditionMask$InfoVerifyVersion_memset
                                                      • String ID:
                                                      • API String ID: 3299124433-0
                                                      • Opcode ID: 2576dc4616e8b2ed0041c1537906ce628c39b9779ebe1db551e1aa8ebc6d1593
                                                      • Instruction ID: 54d242abe5d1c693644b470774137c53894a065a50242be6e8bdc21075493750
                                                      • Opcode Fuzzy Hash: 2576dc4616e8b2ed0041c1537906ce628c39b9779ebe1db551e1aa8ebc6d1593
                                                      • Instruction Fuzzy Hash: 9B111EB0D4031C6EEB659F65DC0ABEA7ABCEB08704F008199A548E61C1D6B94B948FD5
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,00FD1B1E,00000000,?,00FD4E28,000000FF,0000001E,00000000,00000000,00000000,?,00FD3385), ref: 00FD1AEE
                                                      • GetProcAddress.KERNEL32(?,CorExitProcess), ref: 00FD1B00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 1646373207-1276376045
                                                      • Opcode ID: eccdd178e8e2c9f56d34adefa2d811054299e28ee71fe997b9f8c70216b9eef3
                                                      • Instruction ID: 231d15481f79ffcd6e22c26b64e01cc446cd2f7cac17fdf3d1a27bb029db8a41
                                                      • Opcode Fuzzy Hash: eccdd178e8e2c9f56d34adefa2d811054299e28ee71fe997b9f8c70216b9eef3
                                                      • Instruction Fuzzy Hash: DBD0123174420EFBDB005BA5DC06F597B6FAB41752F044157F804E1250EA71DA10F6A1
                                                      APIs
                                                      • lstrcpyA.KERNEL32(?,fabian wosar <3,?,00435218), ref: 00434F23
                                                      • lstrlenA.KERNEL32(00000000,?,00435218), ref: 00434F7F
                                                      • lstrcpyA.KERNEL32(?,?,?,00435218), ref: 00434FAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751727913.0000000000430000.00000040.00001000.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_430000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrlen
                                                      • String ID: fabian wosar <3
                                                      • API String ID: 367037083-1724090804
                                                      • Opcode ID: 560250402e570d9fb667bf73143a7ce1051234589115c82560da08b06a1c4132
                                                      • Instruction ID: 9b1f5d8883905e12cf36a450c5fb74a8fc8acc29c4fc4bd9110ac6be198f8da0
                                                      • Opcode Fuzzy Hash: 560250402e570d9fb667bf73143a7ce1051234589115c82560da08b06a1c4132
                                                      • Instruction Fuzzy Hash: EF310F218081955ADB228F6898407FBBFA1AFCB349F6C309BD8D5C7316D2292846C798
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FD73B0
                                                      • __isleadbyte_l.LIBCMT ref: 00FD73DE
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000), ref: 00FD740C
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000108,00000001,?,00000000), ref: 00FD7442
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 2ca933369b502092202da194a3e7a68c40d75dab3ce013aa95d75aa07d974747
                                                      • Instruction ID: 074de734c3d0b9f37ee6af8eafc4742fcda3c0eb3dacefe04e2294ad9c2dd922
                                                      • Opcode Fuzzy Hash: 2ca933369b502092202da194a3e7a68c40d75dab3ce013aa95d75aa07d974747
                                                      • Instruction Fuzzy Hash: A2318431A08346EFDB22EE65CC45B6A7FA7AF41320F19451AE8549B290F731D850F750
                                                      APIs
                                                      • _free.LIBCMT ref: 00FD4EAC
                                                        • Part of subcall function 00FD4DFB: __FF_MSGBANNER.LIBCMT ref: 00FD4E12
                                                        • Part of subcall function 00FD4DFB: __NMSG_WRITE.LIBCMT ref: 00FD4E19
                                                        • Part of subcall function 00FD4DFB: HeapAlloc.KERNEL32(005C0000,00000000,00000001,00000000,00000000,00000000,?,00FD3385,00000000,00000000,00000000,00000000,?,00FD323A,00000018,00FDFE20), ref: 00FD4E3E
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocHeap_free
                                                      • String ID:
                                                      • API String ID: 1080816511-0
                                                      • Opcode ID: 23d789c686f58522c5286ee17a11d0718fcb3394a012ea8fb89a341c937fead2
                                                      • Instruction ID: 257afde2d162f4e025d353d02cdc22eb3793c3cbfb3961ad2a0fcec27e2ce097
                                                      • Opcode Fuzzy Hash: 23d789c686f58522c5286ee17a11d0718fcb3394a012ea8fb89a341c937fead2
                                                      • Instruction Fuzzy Hash: 4F117733905215ABCB317F74BC0A75A379BAF40370B184527FA45D7361DB35A840B6A5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: a8292b613ccd047416a34022aaf5a22d8ab77da8b922757973516e6eda3415f7
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: F501397241514EFBCF126F84CD428EE3F27BB18394B588516FA5858231C636C9B2BB91
                                                      APIs
                                                        • Part of subcall function 00FD1912: __getptd_noexit.LIBCMT ref: 00FD1913
                                                      • __lock.LIBCMT ref: 00FD3ADA
                                                      • _free.LIBCMT ref: 00FD3B07
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001D.00000002.1751975964.0000000000FD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00FD0000, based on PE: true
                                                      • Associated: 0000001D.00000002.1751953110.0000000000FD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752000225.0000000000FDC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752023672.0000000000FE1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000001D.00000002.1752051812.0000000000FF7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_29_2_fd0000_dwqocx.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __getptd_noexit__lock_free
                                                      • String ID: 0M\
                                                      • API String ID: 1533244847-4229959701
                                                      • Opcode ID: dabdbb8e1e309cc54a372bb0f5645119f5a03b7f73225b54385deec9feb009ed
                                                      • Instruction ID: 73bdd0efa68180467d24f43d9e5c2cf9d4824505e45353f0416baeee46118fe0
                                                      • Opcode Fuzzy Hash: dabdbb8e1e309cc54a372bb0f5645119f5a03b7f73225b54385deec9feb009ed
                                                      • Instruction Fuzzy Hash: B811C236E0172A9BC721AF299841618B3A2BB45B30B1D021FE550A7780DB386E41FFC2